CVE-2021-31826

Publication date 27 April 2021

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied.

Read the notes from the security team

Status

Package Ubuntu Release Status
shibboleth-sp 22.04 LTS jammy
Not affected
21.10 impish
Not affected
21.04 hirsute Ignored end of life
20.10 groovy Ignored end of life
20.04 LTS focal
Fixed 3.0.4+dfsg1-1ubuntu0.2
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release

Notes


sbeattie

does not affect src:shibboleth-sp2

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H