First published: Tue Apr 23 2019(Updated: )
Jan Pokorný discovered that Pacemaker incorrectly handled client-server authentication. A local attacker could possibly use this issue to escalate privileges. (CVE-2018-16877) Jan Pokorný discovered that Pacemaker incorrectly handled certain verifications. A local attacker could possibly use this issue to cause a denial of service. (CVE-2018-16878) Jan Pokorný discovered that Pacemaker incorrectly handled certain memory operations. A local attacker could possibly use this issue to obtain sensitive information in log outputs. This issue only applied to Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-3885)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/pacemaker | <1.1.18-2ubuntu1.19.04.1 | 1.1.18-2ubuntu1.19.04.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/pacemaker | <1.1.18-2ubuntu1.18.10.1 | 1.1.18-2ubuntu1.18.10.1 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/pacemaker | <1.1.18-0ubuntu1.1 | 1.1.18-0ubuntu1.1 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/pacemaker | <1.1.14-2ubuntu1.6 | 1.1.14-2ubuntu1.6 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for Pacemaker vulnerabilities is CVE-2018-16877.
A local attacker could escalate privileges by exploiting the authentication handling issue in Pacemaker.
The versions of Ubuntu affected by the Pacemaker vulnerabilities (CVE-2018-16877) are 19.04, 18.10, 18.04, and 16.04.
The recommended remedy for the Pacemaker vulnerabilities (CVE-2018-16877) in Ubuntu 19.04 is to update to version 1.1.18-2ubuntu1.19.04.1 of the pacemaker package.
You can find more information about the Pacemaker vulnerabilities on the Ubuntu Security Notices website.