First published: Tue Aug 10 2021(Updated: )
A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cockpit-project Cockpit | <260 | |
Redhat Enterprise Linux | =8.0 | |
redhat/cockpit | <260 | 260 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3698.
The severity of CVE-2021-3698 is high (7.5).
Cockpit versions prior to 260 and Red Hat Enterprise Linux 8.0 are affected by CVE-2021-3698.
CVE-2021-3698 affects the way Cockpit handles certificate verification performed by the System Security Services Daemon (SSSD).
Yes, you can find references related to CVE-2021-3698 in the following links: <a href='https://bugzilla.redhat.com/show_bug.cgi?id=1992149' target='_blank'>https://bugzilla.redhat.com/show_bug.cgi?id=1992149</a>, <a href='https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1992432' target='_blank'>https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1992432</a>, <a href='https://cockpit-project.org/guide/latest/cert-authentication.html' target='_blank'>https://cockpit-project.org/guide/latest/cert-authentication.html</a>.