Total vulnerabilities in the database
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux | 7.0 | 7.0.x |
redhat / enterprise_linux | 6.0 | 6.0.x |
redhat / virtualization_host | 4.0 | 4.0.x |
redhat / virtualization | 4.0 | 4.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_eus | 8.1 | 8.1.x |
redhat / enterprise_linux_eus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_aus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_aus | 8.4 | 8.4.x |
fedoraproject / fedora | 34 | 34.x |
fedoraproject / sssd | 2.6.0 | 2.6.0.x |