Debian Security Advisory

DLA-2984-1 condor -- LTS security update

Date Reported:
19 Apr 2022
Affected Packages:
condor
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1008634.
In Mitre's CVE dictionary: CVE-2022-26110.
More information:

Jaime Frey discovered a flaw in HTCondor, a distributed workload management system. An attacker need only have READ-level authorization to a vulnerable daemon using the CLAIMTOBE authentication method. This means they are able to run tools like condor_q or condor_status. Many pools do not restrict who can issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in the default configuration. Thus, it is likely that an attacker could execute this command remotely from an untrusted network, unless prevented by a firewall or other network-level access controls.

For Debian 9 stretch, this problem has been fixed in version 8.4.11~dfsg.1-1+deb9u2.

We recommend that you upgrade your condor packages.

For the detailed security status of condor please refer to its security tracker page at: https://security-tracker.debian.org/tracker/condor

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS