CVE-2010-2496

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
References
Link Resource
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 Issue Tracking Mailing List Patch Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 Issue Tracking Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clusterlabs:cluster_glue:*:*:*:*:*:*:*:*
cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 - Issue Tracking, Mailing List, Patch, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2010-2496 - Issue Tracking, Mailing List, Patch, Third Party Advisory

Information

Published : 2021-10-18 13:15

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2496

Mitre link : CVE-2010-2496

CVE.ORG link : CVE-2010-2496


JSON object : View

Products Affected

clusterlabs

  • pacemaker
  • cluster_glue
CWE
CWE-287

Improper Authentication