Lucene search

K
debianDebianDEBIAN:DLA-2984-1:09E6B
HistoryApr 19, 2022 - 12:57 p.m.

[SECURITY] [DLA 2984-1] condor security update

2022-04-1912:57:01
lists.debian.org
19

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

42.2%


Debian LTS Advisory DLA-2984-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
April 19, 2022 https://wiki.debian.org/LTS

Package : condor
Version : 8.4.11~dfsg.1-1+deb9u2
CVE ID : CVE-2022-26110
Debian Bug : 1008634

Jaime Frey discovered a flaw in HTCondor, a distributed workload management
system. An attacker need only have READ-level authorization to a vulnerable
daemon using the CLAIMTOBE authentication method. This means they are able to
run tools like condor_q or condor_status. Many pools do not restrict who can
issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in
the default configuration. Thus, it is likely that an attacker could execute
this command remotely from an untrusted network, unless prevented by a firewall
or other network-level access controls.

For Debian 9 stretch, this problem has been fixed in version
8.4.11~dfsg.1-1+deb9u2.

We recommend that you upgrade your condor packages.

For the detailed security status of condor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/condor

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

42.2%

Related for DEBIAN:DLA-2984-1:09E6B