7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.7 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.014 Low
EPSS
Percentile
86.1%
Issue Overview:
A flaw was found in pacemaker. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS. (CVE-2018-16878)
A use-after-free flaw was found in pacemaker which could result in certain sensitive information to be leaked via the system logs. (CVE-2019-3885)
A flaw was found in the way pacemaker’s client-server authentication was implemented. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation. (CVE-2018-16877)
Affected Packages:
pacemaker
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update pacemaker to update your system.
New Packages:
aarch64:
pacemaker-1.1.20-5.amzn2.0.2.aarch64
pacemaker-cli-1.1.20-5.amzn2.0.2.aarch64
pacemaker-libs-1.1.20-5.amzn2.0.2.aarch64
pacemaker-cluster-libs-1.1.20-5.amzn2.0.2.aarch64
pacemaker-remote-1.1.20-5.amzn2.0.2.aarch64
pacemaker-libs-devel-1.1.20-5.amzn2.0.2.aarch64
pacemaker-cts-1.1.20-5.amzn2.0.2.aarch64
pacemaker-doc-1.1.20-5.amzn2.0.2.aarch64
pacemaker-nagios-plugins-metadata-1.1.20-5.amzn2.0.2.aarch64
pacemaker-debuginfo-1.1.20-5.amzn2.0.2.aarch64
i686:
pacemaker-1.1.20-5.amzn2.0.2.i686
pacemaker-cli-1.1.20-5.amzn2.0.2.i686
pacemaker-libs-1.1.20-5.amzn2.0.2.i686
pacemaker-cluster-libs-1.1.20-5.amzn2.0.2.i686
pacemaker-remote-1.1.20-5.amzn2.0.2.i686
pacemaker-libs-devel-1.1.20-5.amzn2.0.2.i686
pacemaker-cts-1.1.20-5.amzn2.0.2.i686
pacemaker-doc-1.1.20-5.amzn2.0.2.i686
pacemaker-nagios-plugins-metadata-1.1.20-5.amzn2.0.2.i686
pacemaker-debuginfo-1.1.20-5.amzn2.0.2.i686
src:
pacemaker-1.1.20-5.amzn2.0.2.src
x86_64:
pacemaker-1.1.20-5.amzn2.0.2.x86_64
pacemaker-cli-1.1.20-5.amzn2.0.2.x86_64
pacemaker-libs-1.1.20-5.amzn2.0.2.x86_64
pacemaker-cluster-libs-1.1.20-5.amzn2.0.2.x86_64
pacemaker-remote-1.1.20-5.amzn2.0.2.x86_64
pacemaker-libs-devel-1.1.20-5.amzn2.0.2.x86_64
pacemaker-cts-1.1.20-5.amzn2.0.2.x86_64
pacemaker-doc-1.1.20-5.amzn2.0.2.x86_64
pacemaker-nagios-plugins-metadata-1.1.20-5.amzn2.0.2.x86_64
pacemaker-debuginfo-1.1.20-5.amzn2.0.2.x86_64
Red Hat: CVE-2018-16877, CVE-2018-16878, CVE-2019-3885
Mitre: CVE-2018-16877, CVE-2018-16878, CVE-2019-3885
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.7 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.014 Low
EPSS
Percentile
86.1%