Описание
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| pacemaker | fixed | 2.0.1-3 | package |
Примечания
https://www.openwall.com/lists/oss-security/2019/04/17/1
https://github.com/ClusterLabs/pacemaker/pull/1749 (master)
https://github.com/ClusterLabs/pacemaker/pull/1750 (1.1)
https://lists.clusterlabs.org/pipermail/users/2019-May/025822.html
EPSS
Связанные уязвимости
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Уязвимость программного средства управления ресурсами кластера Pacemaker операционных систем Ubuntu, Fedora, OpenSUSE Leap, Enterprise Linux и Oracle Linux, позволяющая нарушителю повысить свои привилегии
EPSS