Описание
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
8.8 High
CVSS3
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
A flaw was found in the way pacemaker's client-server authentication w ...
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Уязвимость программного средства управления ресурсами кластера Pacemaker операционных систем Ubuntu, Fedora, OpenSUSE Leap, Enterprise Linux и Oracle Linux, позволяющая нарушителю повысить свои привилегии
EPSS
8.8 High
CVSS3
7.8 High
CVSS3
4.6 Medium
CVSS2