First published: Mon Oct 18 2021(Updated: )
stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clusterlabs Cluster Glue | <1.0.6 | |
Clusterlabs Pacemaker | <1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2496 is a vulnerability in stonith-ng in pacemaker and cluster-glue that allows local attackers to gain access to passwords of the HA stack and potentially influence its operations.
CVE-2010-2496 allows local attackers to obtain passwords and potentially manipulate the operations of the HA stack.
Yes, the vulnerability is fixed in cluster-glue version 1.0.6 and newer, and pacemaker version 1.1.3 and newer.
CVE-2010-2496 has a severity rating of medium with a CVSS score of 5.5.
CWE-287 is a weakness related to the improper authentication or handling of credentials, which is the underlying cause of CVE-2010-2496.