Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170610.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169671.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169995.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1424.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-2383.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74231 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1211370 - Issue Tracking | |
References | () https://github.com/ClusterLabs/pacemaker/commit/84ac07c - | |
References | () https://security.gentoo.org/glsa/201710-08 - |
Information
Published : 2015-08-12 14:59
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1867
Mitre link : CVE-2015-1867
CVE.ORG link : CVE-2015-1867
JSON object : View
Products Affected
redhat
- enterprise_linux_resilient_storage
- enterprise_linux_high_availability
clusterlabs
- pacemaker
CWE
CWE-264
Permissions, Privileges, and Access Controls