Name | CVE-2021-45379 |
Description | Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
glewlwyd (PTS) | buster | 1.4.9-1 | fixed |
bullseye | 2.5.2-2+deb11u2 | fixed | |
bookworm, sid | 2.7.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
glewlwyd | source | buster | (not affected) | |||
glewlwyd | source | bullseye | 2.5.2-2+deb11u2 | |||
glewlwyd | source | (unstable) | 2.6.1-1 |
[buster] - glewlwyd <not-affected> (Vulnerable code introduced later)
https://github.com/babelouest/glewlwyd/commit/125281f1c0d4b6a8b49f7e55a757205a2ef01fbe (v2.6.1)