First published: Sun Sep 26 2021(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | <=1:7.9p1-10+deb10u2<=1:7.9p1-10<=1:8.4p1-5<=1:8.4p1-6 | 1:8.7p1-1 1:8.4p1-5+deb11u3 |
Openbsd Openssh | >=6.2<8.8 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
NetApp Clustered Data ONTAP | ||
Netapp Hci Management Node | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Solidfire | ||
Netapp Aff A250 Firmware | ||
Netapp Aff A250 | ||
Netapp Aff 500f Firmware | ||
Netapp Aff 500f | ||
Oracle HTTP Server | =12.2.1.2.0 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
Starwindsoftware Starwind Virtual San | =v8r13-14398 | |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.9p1-3 | |
All of | ||
Netapp Aff A250 Firmware | ||
Netapp Aff A250 | ||
All of | ||
Netapp Aff 500f Firmware | ||
Netapp Aff 500f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSH vulnerability is CVE-2021-41617.
The severity level of CVE-2021-41617 is high with a severity value of 7.
OpenSSH versions 6.2 through 8.x before 8.8 are affected by CVE-2021-41617.
CVE-2021-41617 allows privilege escalation when certain non-default configurations of OpenSSH are used and supplemental groups are not initialized as expected.
Yes, you can find references for CVE-2021-41617 at the following links: [1](https://bugzilla.suse.com/show_bug.cgi?id=1190975), [2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/), [3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/)