Latest clusterlabs pacemaker Vulnerabilities

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its op...
Clusterlabs Cluster Glue<1.0.6
Clusterlabs Pacemaker<1.1.3
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain task...
redhat/pacemaker<1.1.24
redhat/pacemaker<2.0.5
redhat/pacemaker<0:1.1.23-1.el7_9.1
redhat/pacemaker<0:2.0.4-6.el8_3.1
redhat/pacemaker<0:2.0.3-5.el8_2.3
Clusterlabs Pacemaker<1.1.23
and 3 more
Pacemaker before 1.1.6 configure script creates temporary files insecurely
Clusterlabs Pacemaker<1.1.6
debian/pacemaker
A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs.
redhat/pacemaker<2.0.2
ubuntu/pacemaker<1.1.18-0ubuntu1.1
ubuntu/pacemaker<1.1.18-2ubuntu1.18.10.1
ubuntu/pacemaker<1.1.18-2ubuntu1.19.04.1
ubuntu/pacemaker<1.1.14-2ubuntu1.6
Clusterlabs Pacemaker<=2.0.1
and 12 more
A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS
redhat/pacemaker<2.0.2
ubuntu/pacemaker<1.1.18-0ubuntu1.1
ubuntu/pacemaker<1.1.18-2ubuntu1.18.10.1
ubuntu/pacemaker<1.1.18-2ubuntu1.19.04.1
ubuntu/pacemaker<1.1.14-2ubuntu1.6
Clusterlabs Pacemaker<=2.0.1
and 44 more
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weakness...
redhat/pacemaker<2.0.2
ubuntu/pacemaker<1.1.18-0ubuntu1.1
ubuntu/pacemaker<1.1.18-2ubuntu1.18.10.1
ubuntu/pacemaker<1.1.18-2ubuntu1.19.04.1
ubuntu/pacemaker<1.1.14-2ubuntu1.6
Clusterlabs Pacemaker<=2.0.0
and 44 more
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for ...
Clusterlabs Pacemaker<=1.1.16
Redhat Enterprise Linux Server=6.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Server Eus=7.3
Redhat Enterprise Linux Server Eus=7.4
Redhat Enterprise Linux Server Eus=7.5
and 1 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203