Описание
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat build of Quarkus | io.quarkus.platform-quarkus-platform-config | Not affected | ||
| Red Hat Fuse 7 | atomix | Will not fix | ||
| Red Hat Integration Camel K 1 | atomix | Will not fix | ||
| Red Hat Integration Camel Quarkus 1 | atomix | Will not fix |
Показывать по
10
Дополнительная информация
Статус:
Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2056592atomix: Atomix 3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster
EPSS
Процентиль: 46%
0.00237
Низкий
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
nvd
около 4 лет назад
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
CVSS3: 7.5
github
около 4 лет назад
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node.
EPSS
Процентиль: 46%
0.00237
Низкий
7.5 High
CVSS3