Debian Security Advisory

DLA-3436-2 sssd -- LTS regression update

Date Reported:
31 May 2023
Affected Packages:
sssd
Vulnerable:
No
Security database references:
No other external database security references currently available.
More information:

sssd 1.16.3-3.2+deb10u1 (DLA 3436-1) had a broken upgrade path from version 1.16.3-3.2.

One could upgrade sssd-common to 1.16.3-3.2+deb10u1 while leaving libsss-certmap0 at 1.16.3-3.2; the version mismatch broke SSSD as the the fix for CVE-2022-4254 introduces new symbols which are used in sssd-common's sssd_pam.

For Debian 10 buster, this problem has been fixed in version 1.16.3-3.2+deb10u2. This version differs from 1.16.3-3.2+deb10u1 only in package metadata. (Bumping the minimum version for libsss-certmap0 in sssd-common's Depends: field ensures a safe upgrade path.)

We recommend that you upgrade your sssd packages.

For the detailed security status of sssd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sssd

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS