DEBIAN-CVE-2021-41617

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-41617
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-41617.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-41617
Upstream
Published
2021-09-26T19:15:07Z
Modified
2025-09-19T07:31:50.437935Z
Summary
[none]
Details

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.

References

Affected packages

Debian:11 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.4p1-5+deb11u3

Affected versions

1:8.*

1:8.4p1-5
1:8.4p1-5+deb11u1
1:8.4p1-5+deb11u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.7p1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.7p1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / openssh

Package

Name
openssh
Purl
pkg:deb/debian/openssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.7p1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}