In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property
References
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/acassen/keepalived/commit/7977fec0be89ae6fe87405b3f8da2f0b5e415e3d - Patch, Third Party Advisory | |
References | () https://github.com/acassen/keepalived/pull/2063 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00012.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5226RYNMNB7FL4MSJDIBBGPUWH6LMRYV/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O2R6EXURJQFPFPYFWRCZLUYVWQCLSZM/ - |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-11-26 00:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44225
Mitre link : CVE-2021-44225
CVE.ORG link : CVE-2021-44225
JSON object : View
Products Affected
fedoraproject
- fedora
keepalived
- keepalived
CWE