Description
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2758-1 | sssd security update |
Debian DLA |
DLA-3436-1 | sssd security update |
Debian DLA |
DLA-4047-1 | sssd security update |
Ubuntu USN |
USN-5067-1 | SSSD vulnerabilities |
References
History
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Sssd
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Rhel Eus
Subscribe
Rhev Hypervisor
Subscribe
Virtualization
Subscribe
Virtualization Host
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-03T20:33:46.999Z
Reserved: 2021-06-24T00:00:00.000Z
Link: CVE-2021-3621
No data.
Status : Modified
Published: 2021-12-23T21:15:08.920
Modified: 2025-11-03T21:15:42.140
Link: CVE-2021-3621
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN