Description
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3694-1 | openssh security update |
Debian DSA |
DSA-5586-1 | openssh security update |
Ubuntu USN |
USN-5666-1 | OpenSSH vulnerability |
Ubuntu USN |
USN-6565-1 | OpenSSH vulnerabilities |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
Aff 500f
Subscribe
Aff 500f Firmware
Subscribe
Aff A250
Subscribe
Aff A250 Firmware
Subscribe
Clustered Data Ontap
Subscribe
Hci Management Node
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Solidfire
Subscribe
Openbsd
Subscribe
Openssh
Subscribe
Oracle
Subscribe
Http Server
Subscribe
Zfs Storage Appliance Kit
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Starwindsoftware
Subscribe
Starwind Virtual San
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:15:29.208Z
Reserved: 2021-09-26T00:00:00.000Z
Link: CVE-2021-41617
No data.
Status : Modified
Published: 2021-09-26T19:15:07.263
Modified: 2024-11-21T06:26:32.077
Link: CVE-2021-41617
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN