Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
References
Link | Resource |
---|---|
https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/93261 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/10/01/1 | Mailing List Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2578.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html | Third Party Advisory |
http://bugs.clusterlabs.org/show_bug.cgi?id=5269 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-03-24 08:59
Updated : 2018-10-30 09:27
NVD link : CVE-2016-7797
Mitre link : CVE-2016-7797
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
redhat
- enterprise_linux_high_availability
- enterprise_linux_resilient_storage
clusterlabs
- pacemaker
suse
- linux_enterprise_software_development_kit
- linux_enterprise_high_availability
opensuse_project
- leap
opensuse
- leap