stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 | Issue Tracking Mailing List Patch Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 | Issue Tracking Mailing List Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 - Issue Tracking, Mailing List, Patch, Third Party Advisory |
Information
Published : 2021-10-18 13:15
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2496
Mitre link : CVE-2010-2496
CVE.ORG link : CVE-2010-2496
JSON object : View
Products Affected
clusterlabs
- pacemaker
- cluster_glue
CWE
CWE-287
Improper Authentication