-------------------------------------------------------------------------Debian LTS Advisory DLA-2984-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
April 19, 2022                                https://wiki.debian.org/LTS
-------------------------------------------------------------------------Package        : condor
Version        : 8.4.11~dfsg.1-1+deb9u2
CVE ID         : CVE-2022-26110
Debian Bug     : 1008634

Jaime Frey discovered a flaw in HTCondor, a distributed workload management
system. An attacker need only have READ-level authorization to a vulnerable
daemon using the CLAIMTOBE authentication method. This means they are able to
run tools like condor_q or condor_status. Many pools do not restrict who can
issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in
the default configuration. Thus, it is likely that an attacker could execute
this command remotely from an untrusted network, unless prevented by a firewall
or other network-level access controls.  

For Debian 9 stretch, this problem has been fixed in version
8.4.11~dfsg.1-1+deb9u2.

We recommend that you upgrade your condor packages.

For the detailed security status of condor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/condor

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2984-1: condor security update

April 19, 2022
Jaime Frey discovered a flaw in HTCondor, a distributed workload management system

Summary


Jaime Frey discovered a flaw in HTCondor, a distributed workload management
system. An attacker need only have READ-level authorization to a vulnerable
daemon using the CLAIMTOBE authentication method. This means they are able to
run tools like condor_q or condor_status. Many pools do not restrict who can
issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in
the default configuration. Thus, it is likely that an attacker could execute
this command remotely from an untrusted network, unless prevented by a firewall
or other network-level access controls.

For Debian 9 stretch, this problem has been fixed in version
8.4.11~dfsg.1-1+deb9u2.

We recommend that you upgrade your condor packages.

For the detailed security status of condor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/condor

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
-------------------------------------------------------------------------Package : condor
Version : 8.4.11~dfsg.1-1+deb9u2
CVE ID : CVE-2022-26110
Debian Bug : 1008634

Related News