Name | CVE-2021-3698 |
Description | A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
cockpit (PTS) | bullseye | 239-1 | vulnerable |
| bookworm | 287.1-0+deb12u3 | fixed |
| bookworm (security) | 287.1-0+deb12u2 | fixed |
| trixie | 330-4 | fixed |
| sid | 331-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
cockpit | source | buster | (not affected) | | | |
cockpit | source | (unstable) | 260-1 | | | |
Notes
[bullseye] - cockpit <no-dsa> (Minor issue)
[buster] - cockpit <not-affected> (Vulnerable code not present, introduced in 208)
https://bugzilla.redhat.com/show_bug.cgi?id=1992149
Needs sssd 2.6.1
https://cockpit-project.org/blog/cockpit-260.html