Keepalived 2.0.8

CPE Details

Keepalived 2.0.8
2.0.8
2019-07-23
11h52 +00:00
2019-07-23
11h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:keepalived:keepalived:2.0.8:*:*:*:*:*:*:*

Informations

Vendor

keepalived

Product

keepalived

Version

2.0.8

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-44225 2021-11-25 23h00 +00:00 In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property
5.4
Medium
CVE-2018-19044 2018-11-08 19h00 +00:00 keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
4.7
Medium
CVE-2018-19045 2018-11-08 19h00 +00:00 keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information.
7.5
High
CVE-2018-19046 2018-11-08 19h00 +00:00 keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.
4.7
Medium