Show filters
27 Total Results
Displaying 11-20 of 27
Sort by:
Attacker Value
Unknown

CVE-2020-25654

Disclosure Date: November 24, 2020 (last updated February 22, 2025)
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
Attacker Value
Unknown

CVE-2014-0104

Disclosure Date: January 02, 2020 (last updated February 21, 2025)
In fence-agents before 4.0.17 does not verify remote SSL certificates in the fence_cisco_ucs.py script which can potentially allow for man-in-the-middle attackers to spoof SSL servers via arbitrary SSL certificates.
Attacker Value
Unknown

CVE-2011-5271

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
Pacemaker before 1.1.6 configure script creates temporary files insecurely
Attacker Value
Unknown

CVE-2019-10153

Disclosure Date: July 30, 2019 (last updated November 27, 2024)
A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member.
Attacker Value
Unknown

CVE-2019-12779

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
0
Attacker Value
Unknown

CVE-2018-16877

Disclosure Date: April 18, 2019 (last updated November 08, 2023)
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Attacker Value
Unknown

CVE-2019-3885

Disclosure Date: April 18, 2019 (last updated November 08, 2023)
A use-after-free flaw was found in pacemaker up to and including version 2.0.1 which could result in certain sensitive information to be leaked via the system logs.
0
Attacker Value
Unknown

CVE-2018-16878

Disclosure Date: April 18, 2019 (last updated November 08, 2023)
A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS
Attacker Value
Unknown

CVE-2016-7035

Disclosure Date: September 10, 2018 (last updated November 08, 2023)
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
0
Attacker Value
Unknown

CVE-2018-1079

Disclosure Date: April 12, 2018 (last updated November 26, 2024)
pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
0