Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-7797 (GCVE-0-2016-7797)
Vulnerability from cvelistv5
Published
2017-03-24 15:00
Modified
2024-08-06 02:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:04:56.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2578", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "name": "openSUSE-SU-2016:3101", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "name": "[oss-security] 20160930 Re: CVE request: pacemaker DoS when pacemaker remote is in use", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { "name": "openSUSE-SU-2016:2965", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" }, { "name": "93261", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93261" }, { "name": "SUSE-SU-2016:2869", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-24T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:2578", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "name": "openSUSE-SU-2016:3101", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "name": "[oss-security] 20160930 Re: CVE request: pacemaker DoS when pacemaker remote is in use", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { "name": "openSUSE-SU-2016:2965", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" }, { "name": "93261", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93261" }, { "name": "SUSE-SU-2016:2869", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-7797", "datePublished": "2017-03-24T15:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T02:04:56.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-7797\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-03-24T15:59:00.717\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.\"},{\"lang\":\"es\",\"value\":\"Pacemaker en versiones anteriores a 1.1.15, al usar el control remoto de marcapasos, podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (desconexi\u00f3n de nodo) a trav\u00e9s de una conexi\u00f3n no autenticada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-254\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.14\",\"matchCriteriaId\":\"51E5FBB4-CA9F-4B1E-8B96-5A1307EE73B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF605E46-ADCE-45B3-BBBA-E593D3CEE2A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4F47F0-A116-4844-8A2C-B1D8FD18B27E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F150BD9-4B94-42D3-9E14-58665B7FF220\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_high_availability:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92715C0-6341-4617-9F61-C87907D1C3F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66BE726-A258-42D7-B23A-925F50FDF449\"}]}]}],\"references\":[{\"url\":\"http://bugs.clusterlabs.org/show_bug.cgi?id=5269\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2578.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/01/1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93261\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://bugs.clusterlabs.org/show_bug.cgi?id=5269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2578.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/01/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93261\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
fkie_cve-2016-7797
Vulnerability from fkie_nvd
Published
2017-03-24 15:59
Modified
2025-04-20 01:37
Severity ?
Summary
Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://bugs.clusterlabs.org/show_bug.cgi?id=5269 | Issue Tracking, Vendor Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-2578.html | Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/10/01/1 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/93261 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.clusterlabs.org/show_bug.cgi?id=5269 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2578.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/10/01/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93261 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410 | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clusterlabs | pacemaker | * | |
opensuse | leap | 42.2 | |
opensuse_project | leap | 42.1 | |
suse | linux_enterprise_high_availability | 12 | |
suse | linux_enterprise_software_development_kit | 12 | |
redhat | enterprise_linux_high_availability | 7.0 | |
redhat | enterprise_linux_resilient_storage | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E5FBB4-CA9F-4B1E-8B96-5A1307EE73B0", "versionEndIncluding": "1.1.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF605E46-ADCE-45B3-BBBA-E593D3CEE2A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "4B4F47F0-A116-4844-8A2C-B1D8FD18B27E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "5F150BD9-4B94-42D3-9E14-58665B7FF220", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_high_availability:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F92715C0-6341-4617-9F61-C87907D1C3F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F66BE726-A258-42D7-B23A-925F50FDF449", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection." }, { "lang": "es", "value": "Pacemaker en versiones anteriores a 1.1.15, al usar el control remoto de marcapasos, podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (desconexi\u00f3n de nodo) a trav\u00e9s de una conexi\u00f3n no autenticada." } ], "id": "CVE-2016-7797", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-24T15:59:00.717", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93261" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2016:2974-1
Vulnerability from csaf_suse
Published
2016-12-02 10:41
Modified
2016-12-02 10:41
Summary
Security update for pacemaker
Notes
Title of the patch
Security update for pacemaker
Description of the patch
This update for pacemaker fixes the following issues:
- remote: Allow cluster and remote LRM API versions to diverge (bsc#1009076)
- libcrmcommon: fix CVE-2016-7035 (improper IPC guarding) (bsc#1007433)
- sysconfig: minor tweaks (typo, wording)
- spec: more robust check for systemd being in use
- spec: defines instead of some globals + error suppression
- various: issues discovered via valgrind and coverity
- attrd_updater: fix usage of HAVE_ATOMIC_ATTRD
- crmd: cl#5185 - Record pending operations in the CIB before they are performed (bsc#1003565)
- ClusterMon: fix to avoid matching other process with the same PID
- mcp: improve comments for sysconfig options
- remove openssl-devel and libselinux-devel as build dependencies
- tools: crm_standby --version/--help should work without cluster
- libpengine: only log startup-fencing warning once
- pacemaker.service: do not mistakenly suggest killing fenced
- libcrmcommon: report errors consistently when waiting for data on connection (bsc#986644)
- remote: Correctly calculate the remaining timeouts when receiving messages (bsc#986644)
- libfencing: report added node ID correctly
- crm_mon: Do not call setenv with null value
- pengine: Do not fence a maintenance node if it shuts down cleanly (bsc#1000743)
- ping: Avoid temporary files for fping check (bsc#987348)
- all: clarify licensing and copyrights
- crmd: Resend the shutdown request if the DC forgets
- ping: Avoid temp files in fping_check (bsc#987348)
- crmd: Ensure the R_SHUTDOWN is set whenever we ask the DC to shut us down
- crmd: clear remote node operation history only when it comes up
- libcib,libfencing,libtransition: handle memory allocation errors without CRM_CHECK()
- tools: make crm_mon XML schema handle resources with multiple active
- pengine: set OCF_RESKEY_CRM_meta_notify_active_* for multistate resources
- pengine: avoid null dereference in new same-node ordering option
- lrmd,libcluster: ensure g_hash_table_foreach() is never passed a null table
- crmd: don't log warning if abort_unless_down() can't find down event
- lib: Correction of the deletion of the notice registration.
- stonithd: Correction of the wrong connection process name.
- crmd: Keep a state of LRMD in the DC node latest.
- pengine: avoid transition loop for start-then-stop + unfencing
- libpengine: allow pe_order_same_node option for constraints
- cts: Restart systemd-journald with 'systemctl restart systemd-journald.socket' (bsc#995365)
- libcrmcommon: properly handle XML comments when comparing v2 patchset diffs
- crmd: don't abort transitions for CIB comment changes
- libcrmcommon: log XML comments correctly
- libcrmcommon: remove extraneous format specifier from log message
- remote: cl#5269 - Notify other clients of a new connection only if the handshake has completed (bsc#967388, bsc#1002767, CVE-2016-7797)
Patchnames
SUSE-SLE-HA-12-SP1-2016-1742,SUSE-SLE-SDK-12-SP1-2016-1742
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pacemaker", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for pacemaker fixes the following issues:\n\n- remote: Allow cluster and remote LRM API versions to diverge (bsc#1009076)\n- libcrmcommon: fix CVE-2016-7035 (improper IPC guarding) (bsc#1007433)\n- sysconfig: minor tweaks (typo, wording)\n- spec: more robust check for systemd being in use\n- spec: defines instead of some globals + error suppression\n- various: issues discovered via valgrind and coverity\n- attrd_updater: fix usage of HAVE_ATOMIC_ATTRD\n\n- crmd: cl#5185 - Record pending operations in the CIB before they are performed (bsc#1003565)\n- ClusterMon: fix to avoid matching other process with the same PID\n- mcp: improve comments for sysconfig options\n- remove openssl-devel and libselinux-devel as build dependencies\n- tools: crm_standby --version/--help should work without cluster\n- libpengine: only log startup-fencing warning once\n- pacemaker.service: do not mistakenly suggest killing fenced\n- libcrmcommon: report errors consistently when waiting for data on connection (bsc#986644)\n- remote: Correctly calculate the remaining timeouts when receiving messages (bsc#986644)\n- libfencing: report added node ID correctly\n- crm_mon: Do not call setenv with null value\n- pengine: Do not fence a maintenance node if it shuts down cleanly (bsc#1000743)\n- ping: Avoid temporary files for fping check (bsc#987348)\n- all: clarify licensing and copyrights\n- crmd: Resend the shutdown request if the DC forgets\n- ping: Avoid temp files in fping_check (bsc#987348)\n- crmd: Ensure the R_SHUTDOWN is set whenever we ask the DC to shut us down\n- crmd: clear remote node operation history only when it comes up\n- libcib,libfencing,libtransition: handle memory allocation errors without CRM_CHECK()\n- tools: make crm_mon XML schema handle resources with multiple active\n- pengine: set OCF_RESKEY_CRM_meta_notify_active_* for multistate resources\n- pengine: avoid null dereference in new same-node ordering option\n- lrmd,libcluster: ensure g_hash_table_foreach() is never passed a null table\n- crmd: don\u0027t log warning if abort_unless_down() can\u0027t find down event\n- lib: Correction of the deletion of the notice registration.\n- stonithd: Correction of the wrong connection process name.\n- crmd: Keep a state of LRMD in the DC node latest.\n- pengine: avoid transition loop for start-then-stop + unfencing\n- libpengine: allow pe_order_same_node option for constraints\n\n- cts: Restart systemd-journald with \u0027systemctl restart systemd-journald.socket\u0027 (bsc#995365)\n- libcrmcommon: properly handle XML comments when comparing v2 patchset diffs\n- crmd: don\u0027t abort transitions for CIB comment changes\n- libcrmcommon: log XML comments correctly\n- libcrmcommon: remove extraneous format specifier from log message\n\n- remote: cl#5269 - Notify other clients of a new connection only if the handshake has completed (bsc#967388, bsc#1002767, CVE-2016-7797)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-HA-12-SP1-2016-1742,SUSE-SLE-SDK-12-SP1-2016-1742", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2974-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2974-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162974-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2974-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002437.html" }, { "category": "self", "summary": "SUSE Bug 1000743", "url": "https://bugzilla.suse.com/1000743" }, { "category": "self", "summary": "SUSE Bug 1002767", "url": "https://bugzilla.suse.com/1002767" }, { "category": "self", "summary": "SUSE Bug 1003565", "url": "https://bugzilla.suse.com/1003565" }, { "category": "self", "summary": "SUSE Bug 1007433", "url": "https://bugzilla.suse.com/1007433" }, { "category": "self", "summary": "SUSE Bug 1009076", "url": "https://bugzilla.suse.com/1009076" }, { "category": "self", "summary": "SUSE Bug 967388", "url": "https://bugzilla.suse.com/967388" }, { "category": "self", "summary": "SUSE Bug 986644", "url": "https://bugzilla.suse.com/986644" }, { "category": "self", "summary": "SUSE Bug 987348", "url": "https://bugzilla.suse.com/987348" }, { "category": "self", "summary": "SUSE Bug 995365", "url": "https://bugzilla.suse.com/995365" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7035 page", "url": "https://www.suse.com/security/cve/CVE-2016-7035/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7797 page", "url": "https://www.suse.com/security/cve/CVE-2016-7797/" } ], "title": "Security update for pacemaker", "tracking": { "current_release_date": "2016-12-02T10:41:08Z", "generator": { "date": "2016-12-02T10:41:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2974-1", "initial_release_date": "2016-12-02T10:41:08Z", "revision_history": [ { "date": "2016-12-02T10:41:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libpacemaker3-1.1.13-20.1.ppc64le", "product": { "name": "libpacemaker3-1.1.13-20.1.ppc64le", "product_id": "libpacemaker3-1.1.13-20.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-1.1.13-20.1.ppc64le", "product": { "name": "pacemaker-1.1.13-20.1.ppc64le", "product_id": "pacemaker-1.1.13-20.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.13-20.1.ppc64le", "product": { "name": "pacemaker-cli-1.1.13-20.1.ppc64le", "product_id": "pacemaker-cli-1.1.13-20.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.13-20.1.ppc64le", "product": { "name": "pacemaker-cts-1.1.13-20.1.ppc64le", "product_id": "pacemaker-cts-1.1.13-20.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.13-20.1.ppc64le", "product": { "name": "pacemaker-remote-1.1.13-20.1.ppc64le", "product_id": "pacemaker-remote-1.1.13-20.1.ppc64le" } }, { "category": "product_version", "name": "libpacemaker-devel-1.1.13-20.1.ppc64le", "product": { "name": "libpacemaker-devel-1.1.13-20.1.ppc64le", "product_id": "libpacemaker-devel-1.1.13-20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libpacemaker3-1.1.13-20.1.s390x", "product": { "name": "libpacemaker3-1.1.13-20.1.s390x", "product_id": "libpacemaker3-1.1.13-20.1.s390x" } }, { "category": "product_version", "name": "pacemaker-1.1.13-20.1.s390x", "product": { "name": "pacemaker-1.1.13-20.1.s390x", "product_id": "pacemaker-1.1.13-20.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.13-20.1.s390x", "product": { "name": "pacemaker-cli-1.1.13-20.1.s390x", "product_id": "pacemaker-cli-1.1.13-20.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.13-20.1.s390x", "product": { "name": "pacemaker-cts-1.1.13-20.1.s390x", "product_id": "pacemaker-cts-1.1.13-20.1.s390x" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.13-20.1.s390x", "product": { "name": "pacemaker-remote-1.1.13-20.1.s390x", "product_id": "pacemaker-remote-1.1.13-20.1.s390x" } }, { "category": "product_version", "name": "libpacemaker-devel-1.1.13-20.1.s390x", "product": { "name": "libpacemaker-devel-1.1.13-20.1.s390x", "product_id": "libpacemaker-devel-1.1.13-20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libpacemaker3-1.1.13-20.1.x86_64", "product": { "name": "libpacemaker3-1.1.13-20.1.x86_64", "product_id": "libpacemaker3-1.1.13-20.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-1.1.13-20.1.x86_64", "product": { "name": "pacemaker-1.1.13-20.1.x86_64", "product_id": "pacemaker-1.1.13-20.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.13-20.1.x86_64", "product": { "name": "pacemaker-cli-1.1.13-20.1.x86_64", "product_id": "pacemaker-cli-1.1.13-20.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.13-20.1.x86_64", "product": { "name": "pacemaker-cts-1.1.13-20.1.x86_64", "product_id": "pacemaker-cts-1.1.13-20.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.13-20.1.x86_64", "product": { "name": "pacemaker-remote-1.1.13-20.1.x86_64", "product_id": "pacemaker-remote-1.1.13-20.1.x86_64" } }, { "category": "product_version", "name": "libpacemaker-devel-1.1.13-20.1.x86_64", "product": { "name": "libpacemaker-devel-1.1.13-20.1.x86_64", "product_id": "libpacemaker-devel-1.1.13-20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le" }, "product_reference": "libpacemaker3-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.13-20.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x" }, "product_reference": "libpacemaker3-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64" }, "product_reference": "libpacemaker3-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le" }, "product_reference": "pacemaker-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.13-20.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x" }, "product_reference": "pacemaker-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64" }, "product_reference": "pacemaker-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le" }, "product_reference": "pacemaker-cli-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.13-20.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x" }, "product_reference": "pacemaker-cli-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64" }, "product_reference": "pacemaker-cli-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le" }, "product_reference": "pacemaker-cts-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.13-20.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x" }, "product_reference": "pacemaker-cts-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" }, "product_reference": "pacemaker-cts-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le" }, "product_reference": "pacemaker-remote-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.13-20.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x" }, "product_reference": "pacemaker-remote-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64" }, "product_reference": "pacemaker-remote-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le" }, "product_reference": "libpacemaker-devel-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.13-20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x" }, "product_reference": "libpacemaker-devel-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64" }, "product_reference": "libpacemaker-devel-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.13-20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le" }, "product_reference": "pacemaker-cts-1.1.13-20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.13-20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x" }, "product_reference": "pacemaker-cts-1.1.13-20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.13-20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" }, "product_reference": "pacemaker-cts-1.1.13-20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7035" } ], "notes": [ { "category": "general", "text": "An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7035", "url": "https://www.suse.com/security/cve/CVE-2016-7035" }, { "category": "external", "summary": "SUSE Bug 1007433 for CVE-2016-7035", "url": "https://bugzilla.suse.com/1007433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T10:41:08Z", "details": "moderate" } ], "title": "CVE-2016-7035" }, { "cve": "CVE-2016-7797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7797" } ], "notes": [ { "category": "general", "text": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7797", "url": "https://www.suse.com/security/cve/CVE-2016-7797" }, { "category": "external", "summary": "SUSE Bug 1002767 for CVE-2016-7797", "url": "https://bugzilla.suse.com/1002767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:libpacemaker3-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cli-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP1:pacemaker-remote-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libpacemaker-devel-1.1.13-20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:pacemaker-cts-1.1.13-20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T10:41:08Z", "details": "moderate" } ], "title": "CVE-2016-7797" } ] }
suse-su-2016:3162-1
Vulnerability from csaf_suse
Published
2016-12-15 13:52
Modified
2016-12-15 13:52
Summary
Security update for pacemaker
Notes
Title of the patch
Security update for pacemaker
Description of the patch
This update for pacemaker fixes one security issue and several non-security issues.
The following security issue has been fixed:
- libcrmcommon: Fix improper IPC guarding. (bsc#1007433, CVE-2016-7035)
The following non-security issues have been fixed:
- Add logrotate to reqs of pacemaker-cli.
- Add $remote_fs dependencies to the init scripts.
- all: Clarify licensing and copyrights.
- attrd,ipc: Prevent possible segfault on exit. (bsc#986056)
- attrd, libcrmcommon: Validate attrd requests better.
- attrd_updater: Fix usage of HAVE_ATOMIC_ATTRD.
- cib/fencing: Set status callback before connecting to cluster. (bsc#974108)
- ClusterMon: Fix to avoid matching other process with the same PID.
- crmd: Acknowledge cancellation operations for remote connection resources. (bsc#976865)
- crmd: Avoid timeout on older peers when cancelling a resource operation.
- crmd: Record pending operations in the CIB before they are performed. (bsc#1003565)
- crmd: Clear remote node operation history only when it comes up.
- crmd: Clear remote node transient attributes on disconnect. (bsc#981489)
- crmd: Don't abort transitions for CIB comment changes.
- crmd: Ensure the R_SHUTDOWN is set whenever we ask the DC to shut us down.
- crmd: Get full action information earlier. (bsc#981731)
- crmd: Graceful proxy shutdown is now tested. (bsc#981489)
- crmd: Keep a state of LRMD in the DC node latest.
- crmd,lrmd,liblrmd: Use defined constants for lrmd IPC operations. (bsc#981489)
- crmd: Mention that graceful remote shutdowns may cause connection failures. (bsc#981489)
- crmd/pengine: Handle on-fail=ignore properly. (bsc#981731)
- crmd/pengine: Implement on-fail=ignore without allow-fail. (bsc#981731)
- crmd: Remove dead code. (bsc#981731)
- crmd: Rename action number variable in process_graph_event(). (bsc#981731)
- crmd: Resend the shutdown request if the DC forgets.
- crmd: Respect start-failure-is-fatal even for artificially injected events. (bsc#981731)
- crmd: Set remote flag when gracefully shutting down remote nodes. (bsc#981489)
- crmd: Set the shutdown transient attribute in response to LRMD_IPC_OP_SHUTDOWN_REQ from remote nodes. (bsc#981489)
- crmd: Support graceful pacemaker_remote stops. (bsc#981489)
- crmd: Take start-delay into account for the timeout of the action timer. (bsc#977258)
- crmd: Use defined constant for magic 'direct nack' RC. (bsc#981731)
- crmd: Use proper resource agent name when caching metadata.
- crmd: When node load was reduced, crmd carries out a feasible action.
- crm_mon: Avoid logging errors for any CIB changes that we don't care about. (bsc#986931)
- crm_mon: Consistently print ms resource state.
- crm_mon: Do not call setenv with null value.
- crm_mon: Do not log errors for the known CIB changes that should be ignored. (bsc#986931)
- crm_mon: Fix time formatting on x32.
- cts: Avoid kill usage error if DummySD stop called when already stopped.
- CTS: Get Reattach test working again and up-to-date. (bsc#953192)
- cts: Simulate pacemaker_remote failure with kill. (bsc#981489)
- fencing/fence_legacy: Search capable devices by querying them through 'list' action for cluster-glue stonith
agents. (bsc#986265)
- fencing: Record the last known names of nodes to make sure fencing requested with nodeid works. (bsc#974108)
- libais,libcluster,libcrmcommon,liblrmd: Don't use %z specifier.
- libcib,libfencing,libtransition: Handle memory allocation errors without CRM_CHECK().
- lib: Correction of the deletion of the notice registration.
- libcrmcommon: Correct directory name in log message.
- libcrmcommon: Ensure crm_time_t structure is fully initialized by API calls.
- libcrmcommon: Log XML comments correctly.
- libcrmcommon: Properly handle XML comments when comparing v2 patchset diffs.
- libcrmcommon: Really ensure crm_time_t structure is fully initialized by API calls.
- libcrmcommon: Remove extraneous format specifier from log message.
- libcrmcommon: Report errors consistently when waiting for data on connection. (bsc#986644)
- libfencing: Report added node ID correctly.
- liblrmd: Avoid memory leak when closing or deleting lrmd connections.
- libpengine: Allow pe_order_same_node option for constraints.
- libpengine: Log message when stonith disabled, not enabled.
- libpengine: Only log startup-fencing warning once.
- libtransition: Potential memory leak if unpacking action fails.
- lrmd: Handle shutdown a little more cleanly. (bsc#981489)
- lrmd,libcluster: Ensure g_hash_table_foreach() is never passed a null table.
- lrmd,liblrmd: Add lrmd IPC operations for requesting and acknowledging shutdown. (bsc#981489)
- lrmd: Make proxied IPC providers/clients opaque. (bsc#981489)
- mcp: Improve comments for sysconfig options.
- pacemaker_remote: Set LSB Provides header to the service name.
- pacemaker_remote: Support graceful stops. (bsc#981489)
- PE: Correctly update the dependent actions of un-runnable clones.
- PE: Honor the shutdown transient attributes for remote nodes. (bsc#981489)
- pengine: Avoid memory leak when invalid constraint involves set.
- pengine: Avoid null dereference in new same-node ordering option.
- pengine: Avoid transition loop for start-then-stop + unfencing.
- pengine: Avoid use-after-free with location constraint + sets + templates.
- pengine: Better error handling when unpacking sets in location constraints.
- pengine: Consider resource failed if any of the configured monitor operations failed. (bsc#972187)
- pengine: Correction of the record judgment of the failed information.
- pengine: Do not fence a maintenance node if it shuts down cleanly. (bsc#1000743)
- pengine: Correctly set the environment variable 'OCF_RESKEY_CRM_meta_timeout' when 'start-delay' is configured.
(bsc#977258)
- pengine: Only set unfencing constraints once.
- pengine: Organize order of actions for master resources in anti-colocations. (bsc#977800)
- pengine: Organize order of actions for slave resources in anti-colocations. (bsc#977800)
- pengine: Properly order stop actions relative to stonith.
- pengine: Respect asymmetrical ordering when trying to move resources. (bsc#977675)
- pengine: Set OCF_RESKEY_CRM_meta_notify_active_* for multistate resources.
- pengine,tools: Display pending resource state by default when it's available. (bsc#986201)
- ping: Avoid temp files in fping_check. (bsc#987348)
- ping: Avoid temporary files for fping check. (bsc#987348)
- ping: Log sensible error when /tmp is full. (bsc#987348)
- ping resource: Use fping6 for IPv6 hosts. (bsc#976271)
- RA/SysInfo: Reset the node attribute '#health_disk' to 'green' when there's sufficient free disk. (bsc#975079)
- remote: Allow cluster and remote LRM API versions to diverge. (bsc#1009076)
- remote: Correctly calculate the remaining timeouts when receiving messages. (bsc#986644)
- resources: Use OCF version tagging correctly.
- services: Correctly clean up service actions for non-dbus case.
- spec: fence_pcmk only eligible for Pacemaker+CMAN.
- stonithd: Correction of the wrong connection process name.
- sysconfig: Minor tweaks (typo, wording).
- tools: Avoid memory leaks in crm_resource --restart.
- tools: Avoid memory leak when crm_mon unpacks constraints.
- tools: Correctly count starting resources when doing crm_resource --restart.
- tools: crm_resource -T option should not be hidden anymore.
- tools: crm_standby --version/--help should work without cluster.
- tools: Do not send command lines to syslog. (bsc#986676)
- tools: Do not assume all resources restart on same node with crm_resource --restart.
- tools: Don't require node to be known to crm_resource when deleting attribute.
- tools: Properly handle crm_resource --restart with a resource in a group.
- tools: Remember any existing target-role when doing crm_resource --restart.
- various: Issues discovered via valgrind and coverity.
Additionally, the following references have been added to the changelog:
bsc#970733, fate#318381, bsc#1002767, CVE-2016-7797, bsc#971129
Patchnames
slehasp4-pacemaker-12889
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pacemaker", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for pacemaker fixes one security issue and several non-security issues.\n\nThe following security issue has been fixed:\n\n- libcrmcommon: Fix improper IPC guarding. (bsc#1007433, CVE-2016-7035)\n\nThe following non-security issues have been fixed:\n\n- Add logrotate to reqs of pacemaker-cli.\n- Add $remote_fs dependencies to the init scripts.\n- all: Clarify licensing and copyrights.\n- attrd,ipc: Prevent possible segfault on exit. (bsc#986056)\n- attrd, libcrmcommon: Validate attrd requests better.\n- attrd_updater: Fix usage of HAVE_ATOMIC_ATTRD.\n- cib/fencing: Set status callback before connecting to cluster. (bsc#974108)\n- ClusterMon: Fix to avoid matching other process with the same PID.\n- crmd: Acknowledge cancellation operations for remote connection resources. (bsc#976865)\n- crmd: Avoid timeout on older peers when cancelling a resource operation.\n- crmd: Record pending operations in the CIB before they are performed. (bsc#1003565)\n- crmd: Clear remote node operation history only when it comes up.\n- crmd: Clear remote node transient attributes on disconnect. (bsc#981489)\n- crmd: Don\u0027t abort transitions for CIB comment changes.\n- crmd: Ensure the R_SHUTDOWN is set whenever we ask the DC to shut us down.\n- crmd: Get full action information earlier. (bsc#981731)\n- crmd: Graceful proxy shutdown is now tested. (bsc#981489)\n- crmd: Keep a state of LRMD in the DC node latest.\n- crmd,lrmd,liblrmd: Use defined constants for lrmd IPC operations. (bsc#981489)\n- crmd: Mention that graceful remote shutdowns may cause connection failures. (bsc#981489)\n- crmd/pengine: Handle on-fail=ignore properly. (bsc#981731)\n- crmd/pengine: Implement on-fail=ignore without allow-fail. (bsc#981731)\n- crmd: Remove dead code. (bsc#981731)\n- crmd: Rename action number variable in process_graph_event(). (bsc#981731)\n- crmd: Resend the shutdown request if the DC forgets.\n- crmd: Respect start-failure-is-fatal even for artificially injected events. (bsc#981731)\n- crmd: Set remote flag when gracefully shutting down remote nodes. (bsc#981489)\n- crmd: Set the shutdown transient attribute in response to LRMD_IPC_OP_SHUTDOWN_REQ from remote nodes. (bsc#981489)\n- crmd: Support graceful pacemaker_remote stops. (bsc#981489)\n- crmd: Take start-delay into account for the timeout of the action timer. (bsc#977258)\n- crmd: Use defined constant for magic \u0027direct nack\u0027 RC. (bsc#981731)\n- crmd: Use proper resource agent name when caching metadata.\n- crmd: When node load was reduced, crmd carries out a feasible action.\n- crm_mon: Avoid logging errors for any CIB changes that we don\u0027t care about. (bsc#986931)\n- crm_mon: Consistently print ms resource state.\n- crm_mon: Do not call setenv with null value.\n- crm_mon: Do not log errors for the known CIB changes that should be ignored. (bsc#986931)\n- crm_mon: Fix time formatting on x32.\n- cts: Avoid kill usage error if DummySD stop called when already stopped.\n- CTS: Get Reattach test working again and up-to-date. (bsc#953192)\n- cts: Simulate pacemaker_remote failure with kill. (bsc#981489)\n- fencing/fence_legacy: Search capable devices by querying them through \u0027list\u0027 action for cluster-glue stonith \n agents. (bsc#986265)\n- fencing: Record the last known names of nodes to make sure fencing requested with nodeid works. (bsc#974108)\n- libais,libcluster,libcrmcommon,liblrmd: Don\u0027t use %z specifier.\n- libcib,libfencing,libtransition: Handle memory allocation errors without CRM_CHECK().\n- lib: Correction of the deletion of the notice registration.\n- libcrmcommon: Correct directory name in log message.\n- libcrmcommon: Ensure crm_time_t structure is fully initialized by API calls.\n- libcrmcommon: Log XML comments correctly.\n- libcrmcommon: Properly handle XML comments when comparing v2 patchset diffs.\n- libcrmcommon: Really ensure crm_time_t structure is fully initialized by API calls.\n- libcrmcommon: Remove extraneous format specifier from log message.\n- libcrmcommon: Report errors consistently when waiting for data on connection. (bsc#986644)\n- libfencing: Report added node ID correctly.\n- liblrmd: Avoid memory leak when closing or deleting lrmd connections.\n- libpengine: Allow pe_order_same_node option for constraints.\n- libpengine: Log message when stonith disabled, not enabled.\n- libpengine: Only log startup-fencing warning once.\n- libtransition: Potential memory leak if unpacking action fails.\n- lrmd: Handle shutdown a little more cleanly. (bsc#981489)\n- lrmd,libcluster: Ensure g_hash_table_foreach() is never passed a null table.\n- lrmd,liblrmd: Add lrmd IPC operations for requesting and acknowledging shutdown. (bsc#981489)\n- lrmd: Make proxied IPC providers/clients opaque. (bsc#981489)\n- mcp: Improve comments for sysconfig options.\n- pacemaker_remote: Set LSB Provides header to the service name.\n- pacemaker_remote: Support graceful stops. (bsc#981489)\n- PE: Correctly update the dependent actions of un-runnable clones.\n- PE: Honor the shutdown transient attributes for remote nodes. (bsc#981489)\n- pengine: Avoid memory leak when invalid constraint involves set.\n- pengine: Avoid null dereference in new same-node ordering option.\n- pengine: Avoid transition loop for start-then-stop + unfencing.\n- pengine: Avoid use-after-free with location constraint + sets + templates.\n- pengine: Better error handling when unpacking sets in location constraints.\n- pengine: Consider resource failed if any of the configured monitor operations failed. (bsc#972187)\n- pengine: Correction of the record judgment of the failed information.\n- pengine: Do not fence a maintenance node if it shuts down cleanly. (bsc#1000743)\n- pengine: Correctly set the environment variable \u0027OCF_RESKEY_CRM_meta_timeout\u0027 when \u0027start-delay\u0027 is configured. \n (bsc#977258)\n- pengine: Only set unfencing constraints once.\n- pengine: Organize order of actions for master resources in anti-colocations. (bsc#977800)\n- pengine: Organize order of actions for slave resources in anti-colocations. (bsc#977800)\n- pengine: Properly order stop actions relative to stonith.\n- pengine: Respect asymmetrical ordering when trying to move resources. (bsc#977675)\n- pengine: Set OCF_RESKEY_CRM_meta_notify_active_* for multistate resources.\n- pengine,tools: Display pending resource state by default when it\u0027s available. (bsc#986201)\n- ping: Avoid temp files in fping_check. (bsc#987348)\n- ping: Avoid temporary files for fping check. (bsc#987348)\n- ping: Log sensible error when /tmp is full. (bsc#987348)\n- ping resource: Use fping6 for IPv6 hosts. (bsc#976271)\n- RA/SysInfo: Reset the node attribute \u0027#health_disk\u0027 to \u0027green\u0027 when there\u0027s sufficient free disk. (bsc#975079)\n- remote: Allow cluster and remote LRM API versions to diverge. (bsc#1009076)\n- remote: Correctly calculate the remaining timeouts when receiving messages. (bsc#986644)\n- resources: Use OCF version tagging correctly.\n- services: Correctly clean up service actions for non-dbus case.\n- spec: fence_pcmk only eligible for Pacemaker+CMAN.\n- stonithd: Correction of the wrong connection process name.\n- sysconfig: Minor tweaks (typo, wording).\n- tools: Avoid memory leaks in crm_resource --restart.\n- tools: Avoid memory leak when crm_mon unpacks constraints.\n- tools: Correctly count starting resources when doing crm_resource --restart.\n- tools: crm_resource -T option should not be hidden anymore.\n- tools: crm_standby --version/--help should work without cluster.\n- tools: Do not send command lines to syslog. (bsc#986676)\n- tools: Do not assume all resources restart on same node with crm_resource --restart.\n- tools: Don\u0027t require node to be known to crm_resource when deleting attribute.\n- tools: Properly handle crm_resource --restart with a resource in a group.\n- tools: Remember any existing target-role when doing crm_resource --restart.\n- various: Issues discovered via valgrind and coverity.\n\nAdditionally, the following references have been added to the changelog:\n\nbsc#970733, fate#318381, bsc#1002767, CVE-2016-7797, bsc#971129\n", "title": "Description of the patch" }, { "category": "details", "text": "slehasp4-pacemaker-12889", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3162-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3162-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163162-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3162-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002489.html" }, { "category": "self", "summary": "SUSE Bug 1000743", "url": "https://bugzilla.suse.com/1000743" }, { "category": "self", "summary": "SUSE Bug 1002767", "url": "https://bugzilla.suse.com/1002767" }, { "category": "self", "summary": "SUSE Bug 1003565", "url": "https://bugzilla.suse.com/1003565" }, { "category": "self", "summary": "SUSE Bug 1007433", "url": "https://bugzilla.suse.com/1007433" }, { "category": "self", "summary": "SUSE Bug 1009076", "url": "https://bugzilla.suse.com/1009076" }, { "category": "self", "summary": "SUSE Bug 953192", "url": "https://bugzilla.suse.com/953192" }, { "category": "self", "summary": "SUSE Bug 970733", "url": "https://bugzilla.suse.com/970733" }, { "category": "self", "summary": "SUSE Bug 971129", "url": "https://bugzilla.suse.com/971129" }, { "category": "self", "summary": "SUSE Bug 972187", "url": "https://bugzilla.suse.com/972187" }, { "category": "self", "summary": "SUSE Bug 974108", "url": "https://bugzilla.suse.com/974108" }, { "category": "self", "summary": "SUSE Bug 975079", "url": "https://bugzilla.suse.com/975079" }, { "category": "self", "summary": "SUSE Bug 976271", "url": "https://bugzilla.suse.com/976271" }, { "category": "self", "summary": "SUSE Bug 976865", "url": "https://bugzilla.suse.com/976865" }, { "category": "self", "summary": "SUSE Bug 977258", "url": "https://bugzilla.suse.com/977258" }, { "category": "self", "summary": "SUSE Bug 977675", "url": "https://bugzilla.suse.com/977675" }, { "category": "self", "summary": "SUSE Bug 977800", "url": "https://bugzilla.suse.com/977800" }, { "category": "self", "summary": "SUSE Bug 981489", "url": "https://bugzilla.suse.com/981489" }, { "category": "self", "summary": "SUSE Bug 981731", "url": "https://bugzilla.suse.com/981731" }, { "category": "self", "summary": "SUSE Bug 986056", "url": "https://bugzilla.suse.com/986056" }, { "category": "self", "summary": "SUSE Bug 986201", "url": "https://bugzilla.suse.com/986201" }, { "category": "self", "summary": "SUSE Bug 986265", "url": "https://bugzilla.suse.com/986265" }, { "category": "self", "summary": "SUSE Bug 986644", "url": "https://bugzilla.suse.com/986644" }, { "category": "self", "summary": "SUSE Bug 986676", "url": "https://bugzilla.suse.com/986676" }, { "category": "self", "summary": "SUSE Bug 986931", "url": "https://bugzilla.suse.com/986931" }, { "category": "self", "summary": "SUSE Bug 987348", "url": "https://bugzilla.suse.com/987348" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7035 page", "url": "https://www.suse.com/security/cve/CVE-2016-7035/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7797 page", "url": "https://www.suse.com/security/cve/CVE-2016-7797/" } ], "title": "Security update for pacemaker", "tracking": { "current_release_date": "2016-12-15T13:52:25Z", "generator": { "date": "2016-12-15T13:52:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3162-1", "initial_release_date": "2016-12-15T13:52:25Z", "revision_history": [ { "date": "2016-12-15T13:52:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.12-18.1.i586", "product": { "name": "libpacemaker-devel-1.1.12-18.1.i586", "product_id": "libpacemaker-devel-1.1.12-18.1.i586" } }, { "category": "product_version", "name": "libpacemaker3-1.1.12-18.1.i586", "product": { "name": "libpacemaker3-1.1.12-18.1.i586", "product_id": "libpacemaker3-1.1.12-18.1.i586" } }, { "category": "product_version", "name": "pacemaker-1.1.12-18.1.i586", "product": { "name": "pacemaker-1.1.12-18.1.i586", "product_id": "pacemaker-1.1.12-18.1.i586" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.12-18.1.i586", "product": { "name": "pacemaker-cli-1.1.12-18.1.i586", "product_id": "pacemaker-cli-1.1.12-18.1.i586" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.12-18.1.i586", "product": { "name": "pacemaker-remote-1.1.12-18.1.i586", "product_id": "pacemaker-remote-1.1.12-18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.12-18.1.ia64", "product": { "name": "libpacemaker-devel-1.1.12-18.1.ia64", "product_id": "libpacemaker-devel-1.1.12-18.1.ia64" } }, { "category": "product_version", "name": "libpacemaker3-1.1.12-18.1.ia64", "product": { "name": "libpacemaker3-1.1.12-18.1.ia64", "product_id": "libpacemaker3-1.1.12-18.1.ia64" } }, { "category": "product_version", "name": "pacemaker-1.1.12-18.1.ia64", "product": { "name": "pacemaker-1.1.12-18.1.ia64", "product_id": "pacemaker-1.1.12-18.1.ia64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.12-18.1.ia64", "product": { "name": "pacemaker-cli-1.1.12-18.1.ia64", "product_id": "pacemaker-cli-1.1.12-18.1.ia64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.12-18.1.ia64", "product": { "name": "pacemaker-remote-1.1.12-18.1.ia64", "product_id": "pacemaker-remote-1.1.12-18.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.12-18.1.ppc64", "product": { "name": "libpacemaker-devel-1.1.12-18.1.ppc64", "product_id": "libpacemaker-devel-1.1.12-18.1.ppc64" } }, { "category": "product_version", "name": "libpacemaker3-1.1.12-18.1.ppc64", "product": { "name": "libpacemaker3-1.1.12-18.1.ppc64", "product_id": "libpacemaker3-1.1.12-18.1.ppc64" } }, { "category": "product_version", "name": "pacemaker-1.1.12-18.1.ppc64", "product": { "name": "pacemaker-1.1.12-18.1.ppc64", "product_id": "pacemaker-1.1.12-18.1.ppc64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.12-18.1.ppc64", "product": { "name": "pacemaker-cli-1.1.12-18.1.ppc64", "product_id": "pacemaker-cli-1.1.12-18.1.ppc64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.12-18.1.ppc64", "product": { "name": "pacemaker-remote-1.1.12-18.1.ppc64", "product_id": "pacemaker-remote-1.1.12-18.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.12-18.1.s390x", "product": { "name": "libpacemaker-devel-1.1.12-18.1.s390x", "product_id": "libpacemaker-devel-1.1.12-18.1.s390x" } }, { "category": "product_version", "name": "libpacemaker3-1.1.12-18.1.s390x", "product": { "name": "libpacemaker3-1.1.12-18.1.s390x", "product_id": "libpacemaker3-1.1.12-18.1.s390x" } }, { "category": "product_version", "name": "pacemaker-1.1.12-18.1.s390x", "product": { "name": "pacemaker-1.1.12-18.1.s390x", "product_id": "pacemaker-1.1.12-18.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.12-18.1.s390x", "product": { "name": "pacemaker-cli-1.1.12-18.1.s390x", "product_id": "pacemaker-cli-1.1.12-18.1.s390x" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.12-18.1.s390x", "product": { "name": "pacemaker-remote-1.1.12-18.1.s390x", "product_id": "pacemaker-remote-1.1.12-18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.12-18.1.x86_64", "product": { "name": "libpacemaker-devel-1.1.12-18.1.x86_64", "product_id": "libpacemaker-devel-1.1.12-18.1.x86_64" } }, { "category": "product_version", "name": "libpacemaker3-1.1.12-18.1.x86_64", "product": { "name": "libpacemaker3-1.1.12-18.1.x86_64", "product_id": "libpacemaker3-1.1.12-18.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-1.1.12-18.1.x86_64", "product": { "name": "pacemaker-1.1.12-18.1.x86_64", "product_id": "pacemaker-1.1.12-18.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.12-18.1.x86_64", "product": { "name": "pacemaker-cli-1.1.12-18.1.x86_64", "product_id": "pacemaker-cli-1.1.12-18.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.12-18.1.x86_64", "product": { "name": "pacemaker-remote-1.1.12-18.1.x86_64", "product_id": "pacemaker-remote-1.1.12-18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-hae:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.12-18.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586" }, "product_reference": "libpacemaker-devel-1.1.12-18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.12-18.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64" }, "product_reference": "libpacemaker-devel-1.1.12-18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.12-18.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64" }, "product_reference": "libpacemaker-devel-1.1.12-18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.12-18.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x" }, "product_reference": "libpacemaker-devel-1.1.12-18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.12-18.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64" }, "product_reference": "libpacemaker-devel-1.1.12-18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.12-18.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586" }, "product_reference": "libpacemaker3-1.1.12-18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.12-18.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64" }, "product_reference": "libpacemaker3-1.1.12-18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.12-18.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64" }, "product_reference": "libpacemaker3-1.1.12-18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.12-18.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x" }, "product_reference": "libpacemaker3-1.1.12-18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.12-18.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64" }, "product_reference": "libpacemaker3-1.1.12-18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.12-18.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586" }, "product_reference": "pacemaker-1.1.12-18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.12-18.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64" }, "product_reference": "pacemaker-1.1.12-18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.12-18.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64" }, "product_reference": "pacemaker-1.1.12-18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.12-18.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x" }, "product_reference": "pacemaker-1.1.12-18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.12-18.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64" }, "product_reference": "pacemaker-1.1.12-18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.12-18.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586" }, "product_reference": "pacemaker-cli-1.1.12-18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.12-18.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64" }, "product_reference": "pacemaker-cli-1.1.12-18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.12-18.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64" }, "product_reference": "pacemaker-cli-1.1.12-18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.12-18.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x" }, "product_reference": "pacemaker-cli-1.1.12-18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.12-18.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64" }, "product_reference": "pacemaker-cli-1.1.12-18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.12-18.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586" }, "product_reference": "pacemaker-remote-1.1.12-18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.12-18.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64" }, "product_reference": "pacemaker-remote-1.1.12-18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.12-18.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64" }, "product_reference": "pacemaker-remote-1.1.12-18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.12-18.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x" }, "product_reference": "pacemaker-remote-1.1.12-18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.12-18.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" }, "product_reference": "pacemaker-remote-1.1.12-18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7035" } ], "notes": [ { "category": "general", "text": "An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7035", "url": "https://www.suse.com/security/cve/CVE-2016-7035" }, { "category": "external", "summary": "SUSE Bug 1007433 for CVE-2016-7035", "url": "https://bugzilla.suse.com/1007433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-15T13:52:25Z", "details": "moderate" } ], "title": "CVE-2016-7035" }, { "cve": "CVE-2016-7797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7797" } ], "notes": [ { "category": "general", "text": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7797", "url": "https://www.suse.com/security/cve/CVE-2016-7797" }, { "category": "external", "summary": "SUSE Bug 1002767 for CVE-2016-7797", "url": "https://bugzilla.suse.com/1002767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker-devel-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libpacemaker3-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-cli-1.1.12-18.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:pacemaker-remote-1.1.12-18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-15T13:52:25Z", "details": "moderate" } ], "title": "CVE-2016-7797" } ] }
suse-su-2016:2869-1
Vulnerability from csaf_suse
Published
2016-11-22 11:05
Modified
2016-11-22 11:05
Summary
Security update for pacemaker
Notes
Title of the patch
Security update for pacemaker
Description of the patch
This update for pacemaker fixes the following issues:
Security issues fixed:
- CVE-2016-7797: Notify other clients of a new connection only if the handshake has completed (bsc#967388, bsc#1002767).
- CVE-2016-7035: Fixed improper IPC guarding in pacemaker (bsc#1007433).
Bug fixes:
- bsc#1003565: crmd: Record pending operations in the CIB before they are performed
- bsc#1000743: pengine: Do not fence a maintenance node if it shuts down cleanly
- bsc#987348: ping: Avoid temporary files for fping check
- bsc#986644: libcrmcommon: report errors consistently when waiting for data on connection
- bsc#986644: remote: Correctly calculate the remaining timeouts when receiving messages
Patchnames
SUSE-SLE-HA-12-SP2-2016-1679,SUSE-SLE-SDK-12-SP2-2016-1679
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pacemaker", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for pacemaker fixes the following issues:\n\nSecurity issues fixed:\n- CVE-2016-7797: Notify other clients of a new connection only if the handshake has completed (bsc#967388, bsc#1002767).\n- CVE-2016-7035: Fixed improper IPC guarding in pacemaker (bsc#1007433).\n\nBug fixes:\n- bsc#1003565: crmd: Record pending operations in the CIB before they are performed\n- bsc#1000743: pengine: Do not fence a maintenance node if it shuts down cleanly\n- bsc#987348: ping: Avoid temporary files for fping check\n- bsc#986644: libcrmcommon: report errors consistently when waiting for data on connection\n- bsc#986644: remote: Correctly calculate the remaining timeouts when receiving messages\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-HA-12-SP2-2016-1679,SUSE-SLE-SDK-12-SP2-2016-1679", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2869-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2869-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162869-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2869-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002408.html" }, { "category": "self", "summary": "SUSE Bug 1000743", "url": "https://bugzilla.suse.com/1000743" }, { "category": "self", "summary": "SUSE Bug 1002767", "url": "https://bugzilla.suse.com/1002767" }, { "category": "self", "summary": "SUSE Bug 1003565", "url": "https://bugzilla.suse.com/1003565" }, { "category": "self", "summary": "SUSE Bug 1007433", "url": "https://bugzilla.suse.com/1007433" }, { "category": "self", "summary": "SUSE Bug 967388", "url": "https://bugzilla.suse.com/967388" }, { "category": "self", "summary": "SUSE Bug 986644", "url": "https://bugzilla.suse.com/986644" }, { "category": "self", "summary": "SUSE Bug 987348", "url": "https://bugzilla.suse.com/987348" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7035 page", "url": "https://www.suse.com/security/cve/CVE-2016-7035/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7797 page", "url": "https://www.suse.com/security/cve/CVE-2016-7797/" } ], "title": "Security update for pacemaker", "tracking": { "current_release_date": "2016-11-22T11:05:30Z", "generator": { "date": "2016-11-22T11:05:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2869-1", "initial_release_date": "2016-11-22T11:05:30Z", "revision_history": [ { "date": "2016-11-22T11:05:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.15-21.1.aarch64", "product": { "name": "libpacemaker-devel-1.1.15-21.1.aarch64", "product_id": "libpacemaker-devel-1.1.15-21.1.aarch64" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15-21.1.aarch64", "product": { "name": "pacemaker-cts-1.1.15-21.1.aarch64", "product_id": "pacemaker-cts-1.1.15-21.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libpacemaker3-1.1.15-21.1.ppc64le", "product": { "name": "libpacemaker3-1.1.15-21.1.ppc64le", "product_id": "libpacemaker3-1.1.15-21.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-1.1.15-21.1.ppc64le", "product": { "name": "pacemaker-1.1.15-21.1.ppc64le", "product_id": "pacemaker-1.1.15-21.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15-21.1.ppc64le", "product": { "name": "pacemaker-cli-1.1.15-21.1.ppc64le", "product_id": "pacemaker-cli-1.1.15-21.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15-21.1.ppc64le", "product": { "name": "pacemaker-cts-1.1.15-21.1.ppc64le", "product_id": "pacemaker-cts-1.1.15-21.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15-21.1.ppc64le", "product": { "name": "pacemaker-remote-1.1.15-21.1.ppc64le", "product_id": "pacemaker-remote-1.1.15-21.1.ppc64le" } }, { "category": "product_version", "name": "libpacemaker-devel-1.1.15-21.1.ppc64le", "product": { "name": "libpacemaker-devel-1.1.15-21.1.ppc64le", "product_id": "libpacemaker-devel-1.1.15-21.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libpacemaker3-1.1.15-21.1.s390x", "product": { "name": "libpacemaker3-1.1.15-21.1.s390x", "product_id": "libpacemaker3-1.1.15-21.1.s390x" } }, { "category": "product_version", "name": "pacemaker-1.1.15-21.1.s390x", "product": { "name": "pacemaker-1.1.15-21.1.s390x", "product_id": "pacemaker-1.1.15-21.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15-21.1.s390x", "product": { "name": "pacemaker-cli-1.1.15-21.1.s390x", "product_id": "pacemaker-cli-1.1.15-21.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15-21.1.s390x", "product": { "name": "pacemaker-cts-1.1.15-21.1.s390x", "product_id": "pacemaker-cts-1.1.15-21.1.s390x" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15-21.1.s390x", "product": { "name": "pacemaker-remote-1.1.15-21.1.s390x", "product_id": "pacemaker-remote-1.1.15-21.1.s390x" } }, { "category": "product_version", "name": "libpacemaker-devel-1.1.15-21.1.s390x", "product": { "name": "libpacemaker-devel-1.1.15-21.1.s390x", "product_id": "libpacemaker-devel-1.1.15-21.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libpacemaker3-1.1.15-21.1.x86_64", "product": { "name": "libpacemaker3-1.1.15-21.1.x86_64", "product_id": "libpacemaker3-1.1.15-21.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-1.1.15-21.1.x86_64", "product": { "name": "pacemaker-1.1.15-21.1.x86_64", "product_id": "pacemaker-1.1.15-21.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15-21.1.x86_64", "product": { "name": "pacemaker-cli-1.1.15-21.1.x86_64", "product_id": "pacemaker-cli-1.1.15-21.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15-21.1.x86_64", "product": { "name": "pacemaker-cts-1.1.15-21.1.x86_64", "product_id": "pacemaker-cts-1.1.15-21.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15-21.1.x86_64", "product": { "name": "pacemaker-remote-1.1.15-21.1.x86_64", "product_id": "pacemaker-remote-1.1.15-21.1.x86_64" } }, { "category": "product_version", "name": "libpacemaker-devel-1.1.15-21.1.x86_64", "product": { "name": "libpacemaker-devel-1.1.15-21.1.x86_64", "product_id": "libpacemaker-devel-1.1.15-21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le" }, "product_reference": "libpacemaker3-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15-21.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x" }, "product_reference": "libpacemaker3-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64" }, "product_reference": "libpacemaker3-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le" }, "product_reference": "pacemaker-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15-21.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x" }, "product_reference": "pacemaker-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64" }, "product_reference": "pacemaker-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le" }, "product_reference": "pacemaker-cli-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15-21.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x" }, "product_reference": "pacemaker-cli-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64" }, "product_reference": "pacemaker-cli-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le" }, "product_reference": "pacemaker-cts-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x" }, "product_reference": "pacemaker-cts-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" }, "product_reference": "pacemaker-cts-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le" }, "product_reference": "pacemaker-remote-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15-21.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x" }, "product_reference": "pacemaker-remote-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64" }, "product_reference": "pacemaker-remote-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15-21.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64" }, "product_reference": "libpacemaker-devel-1.1.15-21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le" }, "product_reference": "libpacemaker-devel-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15-21.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x" }, "product_reference": "libpacemaker-devel-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64" }, "product_reference": "libpacemaker-devel-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64" }, "product_reference": "pacemaker-cts-1.1.15-21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le" }, "product_reference": "pacemaker-cts-1.1.15-21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x" }, "product_reference": "pacemaker-cts-1.1.15-21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15-21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" }, "product_reference": "pacemaker-cts-1.1.15-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7035" } ], "notes": [ { "category": "general", "text": "An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7035", "url": "https://www.suse.com/security/cve/CVE-2016-7035" }, { "category": "external", "summary": "SUSE Bug 1007433 for CVE-2016-7035", "url": "https://bugzilla.suse.com/1007433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-22T11:05:30Z", "details": "moderate" } ], "title": "CVE-2016-7035" }, { "cve": "CVE-2016-7797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7797" } ], "notes": [ { "category": "general", "text": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7797", "url": "https://www.suse.com/security/cve/CVE-2016-7797" }, { "category": "external", "summary": "SUSE Bug 1002767 for CVE-2016-7797", "url": "https://bugzilla.suse.com/1002767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:libpacemaker3-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cli-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:pacemaker-remote-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libpacemaker-devel-1.1.15-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:pacemaker-cts-1.1.15-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-22T11:05:30Z", "details": "moderate" } ], "title": "CVE-2016-7797" } ] }
gsd-2016-7797
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-7797", "description": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "id": "GSD-2016-7797", "references": [ "https://www.suse.com/security/cve/CVE-2016-7797.html", "https://access.redhat.com/errata/RHSA-2016:2578", "https://ubuntu.com/security/CVE-2016-7797" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-7797" ], "details": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "id": "GSD-2016-7797", "modified": "2023-12-13T01:21:20.855783Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7797", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269", "refsource": "MISC", "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-2578.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "name": "http://www.openwall.com/lists/oss-security/2016/10/01/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "name": "http://www.securityfocus.com/bid/93261", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/93261" }, { "name": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410", "refsource": "MISC", "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_high_availability:12:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_high_availability:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7797" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-254" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" }, { "name": "93261", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93261" }, { "name": "[oss-security] 20160930 Re: CVE request: pacemaker DoS when pacemaker remote is in use", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "name": "RHSA-2016:2578", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "name": "openSUSE-SU-2016:3101", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "name": "openSUSE-SU-2016:2965", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "name": "SUSE-SU-2016:2869", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" }, { "name": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2018-10-30T16:27Z", "publishedDate": "2017-03-24T15:59Z" } } }
ghsa-gp6f-9wm3-5hr4
Vulnerability from github
Published
2022-05-14 02:11
Modified
2022-05-14 02:11
Severity ?
VLAI Severity ?
Details
Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
{ "affected": [], "aliases": [ "CVE-2016-7797" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-03-24T15:59:00Z", "severity": "HIGH" }, "details": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "id": "GHSA-gp6f-9wm3-5hr4", "modified": "2022-05-14T02:11:47Z", "published": "2022-05-14T02:11:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7797" }, { "type": "WEB", "url": "https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410" }, { "type": "WEB", "url": "http://bugs.clusterlabs.org/show_bug.cgi?id=5269" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2578.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/10/01/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/93261" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2016:2578
Vulnerability from csaf_redhat
Published
2016-11-03 08:07
Modified
2024-11-22 09:51
Summary
Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update
Notes
Topic
An update for pacemaker is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.
The following packages have been upgraded to a newer upstream version: pacemaker (1.1.15). (BZ#1304771)
Security Fix(es):
* It was found that the connection between a pacemaker cluster and a pacemaker_remote node could be shut down using a new unauthenticated connection. A remote attacker could use this flaw to cause a denial of service. (CVE-2016-7797)
Red Hat would like to thank Alain Moulle (ATOS/BULL) for reporting this issue.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for pacemaker is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Pacemaker cluster resource manager is a collection of technologies working together to provide data integrity and the ability to maintain application availability in the event of a failure.\n\nThe following packages have been upgraded to a newer upstream version: pacemaker (1.1.15). (BZ#1304771)\n\nSecurity Fix(es):\n\n* It was found that the connection between a pacemaker cluster and a pacemaker_remote node could be shut down using a new unauthenticated connection. A remote attacker could use this flaw to cause a denial of service. (CVE-2016-7797)\n\nRed Hat would like to thank Alain Moulle (ATOS/BULL) for reporting this issue.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2578", "url": "https://access.redhat.com/errata/RHSA-2016:2578" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html" }, { "category": "external", "summary": "1240330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240330" }, { "category": "external", "summary": "1268313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1268313" }, { "category": "external", "summary": "1281450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281450" }, { "category": "external", "summary": "1284069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284069" }, { "category": "external", "summary": "1287315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287315" }, { "category": "external", "summary": "1288929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288929" }, { "category": "external", "summary": "1304771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304771" }, { "category": "external", "summary": "1310486", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310486" }, { "category": "external", "summary": "1312094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312094" }, { "category": "external", "summary": "1314157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314157" }, { "category": "external", "summary": "1323544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323544" }, { "category": "external", "summary": "1327469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327469" }, { "category": "external", "summary": "1338623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338623" }, { "category": "external", "summary": "1345876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1345876" }, { "category": "external", "summary": "1346726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346726" }, { "category": "external", "summary": "1361533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361533" }, { "category": "external", "summary": "1372009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372009" }, { "category": "external", "summary": "1379784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379784" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2578.json" } ], "title": "Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T09:51:26+00:00", "generator": { "date": "2024-11-22T09:51:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2578", "initial_release_date": "2016-11-03T08:07:24+00:00", "revision_history": [ { "date": "2016-11-03T08:07:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-03T08:07:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:51:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server High Availability (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pacemaker-libs-0:1.1.15-11.el7.i686", "product": { "name": "pacemaker-libs-0:1.1.15-11.el7.i686", "product_id": "pacemaker-libs-0:1.1.15-11.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs@1.1.15-11.el7?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-libs-devel-0:1.1.15-11.el7.i686", "product": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.i686", "product_id": "pacemaker-libs-devel-0:1.1.15-11.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs-devel@1.1.15-11.el7?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-debuginfo-0:1.1.15-11.el7.i686", "product": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.i686", "product_id": "pacemaker-debuginfo-0:1.1.15-11.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-debuginfo@1.1.15-11.el7?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "product": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "product_id": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cluster-libs@1.1.15-11.el7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "pacemaker-doc-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-doc-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-doc-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-doc@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cluster-libs@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-nagios-plugins-metadata@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs-devel@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-cli-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-cli-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-cli-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cli@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-debuginfo@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-cts-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-cts-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-cts-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cts@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-remote-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-remote-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-remote-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-remote@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-libs-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-libs-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-libs-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs@1.1.15-11.el7?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-0:1.1.15-11.el7.x86_64", "product": { "name": "pacemaker-0:1.1.15-11.el7.x86_64", "product_id": "pacemaker-0:1.1.15-11.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker@1.1.15-11.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "pacemaker-libs-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-libs-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-libs-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-cts-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-cts-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-cts-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cts@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-remote-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-remote-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-remote-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-remote@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs-devel@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-doc-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-doc-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-doc-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-doc@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-nagios-plugins-metadata@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-cli-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-cli-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-cli-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cli@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-debuginfo@1.1.15-11.el7?arch=s390x" } } }, { "category": "product_version", "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "product": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "product_id": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cluster-libs@1.1.15-11.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pacemaker-0:1.1.15-11.el7.src", "product": { "name": "pacemaker-0:1.1.15-11.el7.src", "product_id": "pacemaker-0:1.1.15-11.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker@1.1.15-11.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.15-11.el7.src as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.src" }, "product_reference": "pacemaker-0:1.1.15-11.el7.src", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-cli-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-cli-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-cts-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-cts-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-debuginfo-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-doc-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-doc-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-libs-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-libs-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-libs-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-libs-devel-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-remote-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server High Availability (v. 7)", "product_id": "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-remote-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.15-11.el7.src as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.src" }, "product_reference": "pacemaker-0:1.1.15-11.el7.src", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-cli-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-cli-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-cts-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-cts-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-debuginfo-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-doc-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-doc-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-libs-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-libs-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-libs-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.i686 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.i686" }, "product_reference": "pacemaker-libs-devel-0:1.1.15-11.el7.i686", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.15-11.el7.s390x as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.s390x" }, "product_reference": "pacemaker-remote-0:1.1.15-11.el7.s390x", "relates_to_product_reference": "7Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.15-11.el7.x86_64 as a component of Red Hat Enterprise Linux Server Resilient Storage (v. 7)", "product_id": "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.x86_64" }, "product_reference": "pacemaker-remote-0:1.1.15-11.el7.x86_64", "relates_to_product_reference": "7Server-ResilientStorage" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Alain Moulle" ], "organization": "ATOS/BULL" } ], "cve": "CVE-2016-7797", "discovery_date": "2016-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1379784" } ], "notes": [ { "category": "description", "text": "It was found that the connection between a pacemaker cluster and a pacemaker_remote node could be shut down using a new unauthenticated connection. A remote attacker could use this flaw to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "pacemaker: pacemaker remote nodes vulnerable to hijacking, resulting in a DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.src", "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.src", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7797" }, { "category": "external", "summary": "RHBZ#1379784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7797" } ], "release_date": "2016-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-03T08:07:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.src", "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.src", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2578" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.src", "7Server-HighAvailability:pacemaker-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cli-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-cts-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-doc-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-libs-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.i686", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.s390x", "7Server-HighAvailability:pacemaker-remote-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.src", "7Server-ResilientStorage:pacemaker-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cli-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-cts-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-debuginfo-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-doc-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-libs-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.i686", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-libs-devel-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-nagios-plugins-metadata-0:1.1.15-11.el7.x86_64", "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.s390x", "7Server-ResilientStorage:pacemaker-remote-0:1.1.15-11.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pacemaker: pacemaker remote nodes vulnerable to hijacking, resulting in a DoS attack" } ] }
opensuse-su-2024:10507-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 on GA media
Notes
Title of the patch
libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 on GA media
Description of the patch
These are all security issues fixed in the libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10507
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10507", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10507-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2496 page", "url": "https://www.suse.com/security/cve/CVE-2010-2496/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1867 page", "url": "https://www.suse.com/security/cve/CVE-2015-1867/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7035 page", "url": "https://www.suse.com/security/cve/CVE-2016-7035/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7797 page", "url": "https://www.suse.com/security/cve/CVE-2016-7797/" } ], "title": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10507-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "product": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "product_id": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64" } }, { "category": "product_version", "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "product": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "product_id": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64" } }, { "category": "product_version", "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "product": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "product_id": "pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "product": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "product_id": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "product": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "product_id": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "product": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "product_id": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product_id": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le" } }, { "category": "product_version", "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product_id": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product_id": "pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product_id": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product_id": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "product_id": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "product": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "product_id": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x" } }, { "category": "product_version", "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "product": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "product_id": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x" } }, { "category": "product_version", "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "product": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "product_id": "pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "product": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "product_id": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "product": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "product_id": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "product": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "product_id": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "product": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "product_id": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64" } }, { "category": "product_version", "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "product": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "product_id": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "product": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "product_id": "pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "product": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "product_id": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "product": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "product_id": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64" } }, { "category": "product_version", "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64", "product": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64", "product_id": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64" }, "product_reference": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le" }, "product_reference": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x" }, "product_reference": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64" }, "product_reference": "libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64" }, "product_reference": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le" }, "product_reference": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x" }, "product_reference": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64" }, "product_reference": "libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64" }, "product_reference": "pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le" }, "product_reference": "pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x" }, "product_reference": "pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64" }, "product_reference": "pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64" }, "product_reference": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le" }, "product_reference": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x" }, "product_reference": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64" }, "product_reference": "pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64" }, "product_reference": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le" }, "product_reference": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x" }, "product_reference": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64" }, "product_reference": "pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64" }, "product_reference": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le" }, "product_reference": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x" }, "product_reference": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" }, "product_reference": "pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-2496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2496" } ], "notes": [ { "category": "general", "text": "stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2496", "url": "https://www.suse.com/security/cve/CVE-2010-2496" }, { "category": "external", "summary": "SUSE Bug 620781 for CVE-2010-2496", "url": "https://bugzilla.suse.com/620781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-2496" }, { "cve": "CVE-2015-1867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1867" } ], "notes": [ { "category": "general", "text": "Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1867", "url": "https://www.suse.com/security/cve/CVE-2015-1867" }, { "category": "external", "summary": "SUSE Bug 927828 for CVE-2015-1867", "url": "https://bugzilla.suse.com/927828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1867" }, { "cve": "CVE-2016-7035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7035" } ], "notes": [ { "category": "general", "text": "An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7035", "url": "https://www.suse.com/security/cve/CVE-2016-7035" }, { "category": "external", "summary": "SUSE Bug 1007433 for CVE-2016-7035", "url": "https://bugzilla.suse.com/1007433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7035" }, { "cve": "CVE-2016-7797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7797" } ], "notes": [ { "category": "general", "text": "Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7797", "url": "https://www.suse.com/security/cve/CVE-2016-7797" }, { "category": "external", "summary": "SUSE Bug 1002767 for CVE-2016-7797", "url": "https://bugzilla.suse.com/1002767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker-devel-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:libpacemaker3-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cli-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-cts-1.1.15+git20161104.b6f251a-1.1.x86_64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.aarch64", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.ppc64le", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.s390x", "openSUSE Tumbleweed:pacemaker-remote-1.1.15+git20161104.b6f251a-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7797" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…