Количество 17
Количество 17

BDU:2023-07637
Уязвимость команды sssctl сервиса управления доступом к удаленным каталогам и механизма аутентификации SSSD, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240916-11
Уязвимость sssd

CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-3621
A flaw was found in SSSD, where the sssctl command was vulnerable to s ...

openSUSE-SU-2021:2941-1
Security update for sssd

SUSE-SU-2022:2763-1
Security update for sssd

SUSE-SU-2022:1258-1
Security update for sssd

SUSE-SU-2022:0826-1
Security update for sssd

SUSE-SU-2021:2941-1
Security update for sssd

SUSE-SU-2021:2873-1
Security update for sssd

SUSE-RU-2021:3185-1
Recommended update for sssd

RLSA-2021:3151
Important: sssd security update
GHSA-g527-g4q2-57xc
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
ELSA-2021-3336
ELSA-2021-3336: sssd security and bug fix update (IMPORTANT)
ELSA-2021-3151
ELSA-2021-3151: sssd security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-07637 Уязвимость команды sssctl сервиса управления доступом к удаленным каталогам и механизма аутентификации SSSD, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 8.8 | 0% Низкий | около 4 лет назад |
![]() | ROS-20240916-11 Уязвимость sssd | CVSS3: 8.8 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 6.7 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
CVE-2021-3621 A flaw was found in SSSD, where the sssctl command was vulnerable to s ... | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
![]() | openSUSE-SU-2021:2941-1 Security update for sssd | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2022:2763-1 Security update for sssd | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:1258-1 Security update for sssd | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:0826-1 Security update for sssd | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2021:2941-1 Security update for sssd | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2873-1 Security update for sssd | 0% Низкий | почти 4 года назад | |
![]() | SUSE-RU-2021:3185-1 Recommended update for sssd | 0% Низкий | почти 4 года назад | |
![]() | RLSA-2021:3151 Important: sssd security update | 0% Низкий | почти 4 года назад | |
GHSA-g527-g4q2-57xc A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
ELSA-2021-3336 ELSA-2021-3336: sssd security and bug fix update (IMPORTANT) | почти 4 года назад | |||
ELSA-2021-3151 ELSA-2021-3151: sssd security update (IMPORTANT) | почти 4 года назад |
Уязвимостей на страницу