CVE-2021-41617

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
References
Link Resource
https://bugzilla.suse.com/show_bug.cgi?id=1190975 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5586
https://www.openssh.com/security.html Vendor Advisory
https://www.openssh.com/txt/release-8.8 Release Notes Vendor Advisory
https://www.openwall.com/lists/oss-security/2021/09/26/1 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Third Party Advisory
https://www.starwindsoftware.com/security/sw-20220805-0001/ Third Party Advisory
https://www.tenable.com/plugins/nessus/154174
https://bugzilla.suse.com/show_bug.cgi?id=1190975 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5586
https://www.openssh.com/security.html Vendor Advisory
https://www.openssh.com/txt/release-8.8 Release Notes Vendor Advisory
https://www.openwall.com/lists/oss-security/2021/09/26/1 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Third Party Advisory
https://www.starwindsoftware.com/security/sw-20220805-0001/ Third Party Advisory
https://www.tenable.com/plugins/nessus/154174
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8r13:14398:*:*:*:*:*:*

History

No history.

Information

Published : 2021-09-26 19:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41617

Mitre link : CVE-2021-41617

CVE.ORG link : CVE-2021-41617


JSON object : View

Products Affected

netapp

  • active_iq_unified_manager
  • hci_management_node
  • clustered_data_ontap
  • aff_500f_firmware
  • aff_500f
  • aff_a250_firmware
  • ontap_select_deploy_administration_utility
  • solidfire
  • aff_a250

starwindsoftware

  • starwind_virtual_san

oracle

  • http_server
  • zfs_storage_appliance_kit

fedoraproject

  • fedora

openbsd

  • openssh