Replies: 2 comments 1 reply
-
Hi @hangloose85 when talking about security you should always talk about the concerned operating system. I guess you're talking about GLPI Agent on windows. Actually, on this OS, the agent is provided with the openssl library built for StrawberryPerl 5.32 which is the 1.1.1i and so yes, it is concerned by this CVE. As far I know, but I'm not an expert, this CVE has no known exploit and even less with the agent as target. Anyway, I read carefully the CVE description and also this Sophos article. IMHO, this flow is really not critical in the agent context:
I can also tell you the agent won't access any external public server you are not aware about. It may be possible in the future for a feature like auto-update, but this won't enabled by default. That said and to answer your primary "when will it be fixed ?" question, I know it will be in a near future as I'm monitoring the StrawberryPerl project for such updates, and the project is not dead. I think it will be fixed during the next 6 months but I can't tell for sure. For sure, I can tell you a fixed nightly build will be available as soon as an openssl library update is available from the StrawberryPerl project. If you have some budget to invest, you can also contact us with your GLPI subscription to request we work on an earlier fix. P.S.:
|
Beta Was this translation helpful? Give feedback.
-
Hi @raccooox I worked on the packaging building process so we can include our chosen libraries. From now, we will include OpenSSL 3.2.1. So future releases won't anymore be concerned by this CVE. I still have some works planed on the windows packaging before the next release which will be 1.8, but the next release should happen in the next few weeks. |
Beta Was this translation helpful? Give feedback.
-
Hi
does anyone know when the vulnerability CVE-2021-3711 will be fixed?
Found in GLPI Agent v 1.4
Beta Was this translation helpful? Give feedback.
All reactions