Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2013-0281
Vulnerability from cvelistv5
Published
2013-11-23 11:00
Modified
2024-08-06 14:18
Severity ?
EPSS score ?
Summary
Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2013:1635", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1635.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-23T18:10:04", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2013:1635", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1635.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0281", "datePublished": "2013-11-23T11:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-0281\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-11-23T11:55:04.287\",\"lastModified\":\"2024-11-21T01:47:13.207\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).\"},{\"lang\":\"es\",\"value\":\"Pacemaker 1.1.10, cuando la configuraci\u00f3n o recurso de la administraci\u00f3n remota Cluster Information Base (CIB) est\u00e1 activada, no limita la duraci\u00f3n de las conexiones hacia los sockets de bloqueo, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bloqueo de conexi\u00f3n).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clusterlabs:pacemaker:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477AF770-650A-4292-BB7E-F0BF092187E9\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1635.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=891922\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1635.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=891922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]}]}}" } }
rhsa-2013_1635
Vulnerability from csaf_redhat
Published
2013-11-20 16:41
Modified
2024-11-22 06:55
Summary
Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update
Notes
Topic
Updated pacemaker packages that fix one security issue, several bugs, and
add various enhancements are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Pacemaker is a high-availability cluster resource manager with a powerful
policy engine.
A denial of service flaw was found in the way Pacemaker performed
authentication and processing of remote connections in certain
circumstances. When Pacemaker was configured to allow remote Cluster
Information Base (CIB) configuration or resource management, a remote
attacker could use this flaw to cause Pacemaker to block indefinitely
(preventing it from serving other requests). (CVE-2013-0281)
Note: The default Pacemaker configuration in Red Hat Enterprise Linux 6 has
the remote CIB management functionality disabled.
The pacemaker package has been upgraded to upstream version 1.1.10, which
provides a number of bug fixes and enhancements over the previous version:
* Pacemaker no longer assumes unknown cman nodes are safely stopped.
* The core dump file now converts all exit codes into positive 'errno'
values.
* Pacemaker ensures a return to a stable state after too many fencing
failures, and initiates a shutdown if a node claimed to be fenced is still
active.
* The crm_error tool adds the ability to list and print error symbols.
* The crm_resource command allows individual resources to be reprobed, and
implements the "--ban" option for moving resources away from nodes.
The "--clear" option has replaced the "--unmove" option. Also, crm_resource
now supports OCF tracing when using the "--force" option.
* The IPC mechanism restores the ability for members of the haclient group
to connect to the cluster.
* The Policy Engine daemon allows active nodes in the current membership to
be fenced without quorum.
* Policy Engine now suppresses meaningless IDs when displaying anonymous
clone status, supports maintenance mode for a single node, and correctly
handles the recovered resources before they are operated on.
* XML configuration files are now checked for non-printing characters and
replaced with their octal equivalent when exporting XML text. Also, a more
reliable buffer allocation strategy has been implemented to prevent
lockups.
(BZ#987355)
Additional bug fixes:
* The "crm_resource --move" command was designed for atomic resources and
could not handle resources on clones, masters, or slaves present on
multiple nodes. Consequently, crm_resource could not obtain enough
information to move a resource and did not perform any action. The "--ban"
and "--clear" options have been added to allow the administrator to
instruct the cluster unambiguously. Clone, master, and slave resources can
now be navigated within the cluster as expected. (BZ#902407)
* The hacluster user account did not have a user identification (UID) or
group identification (GID) number reserved on the system. Thus, UID and GID
values were picked randomly during the installation process. The UID and
GID number 189 was reserved for hacluster and is now used consistently for
all installations. (BZ#908450)
* Certain clusters used node host names that did not match the output of
the "uname -n" command. Thus, the default node name used by the crm_standby
and crm_failcount commands was incorrect and caused the cluster to ignore
the update by the administrator. The crm_node command is now used instead
of the uname utility in helper scripts. As a result, the cluster behaves as
expected. (BZ#913093)
* Due to incorrect return code handling, internal recovery logic of the
crm_mon utility was not executed when a configuration updated failed to
apply, leading to an assertion failure. Return codes are now checked
correctly, and the recovery of an expected error state is now handled
transparently. (BZ#951371)
* cman's automatic unfencing feature failed when combined with Pacemaker.
Support for automated unfencing in Pacemaker has been added, and the
unwanted behavior no longer occurs. (BZ#996850)
All pacemaker users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated pacemaker packages that fix one security issue, several bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Pacemaker is a high-availability cluster resource manager with a powerful\npolicy engine.\n\nA denial of service flaw was found in the way Pacemaker performed\nauthentication and processing of remote connections in certain\ncircumstances. When Pacemaker was configured to allow remote Cluster\nInformation Base (CIB) configuration or resource management, a remote\nattacker could use this flaw to cause Pacemaker to block indefinitely\n(preventing it from serving other requests). (CVE-2013-0281)\n\nNote: The default Pacemaker configuration in Red Hat Enterprise Linux 6 has\nthe remote CIB management functionality disabled.\n\nThe pacemaker package has been upgraded to upstream version 1.1.10, which\nprovides a number of bug fixes and enhancements over the previous version:\n\n* Pacemaker no longer assumes unknown cman nodes are safely stopped.\n\n* The core dump file now converts all exit codes into positive \u0027errno\u0027\nvalues.\n\n* Pacemaker ensures a return to a stable state after too many fencing\nfailures, and initiates a shutdown if a node claimed to be fenced is still\nactive.\n\n* The crm_error tool adds the ability to list and print error symbols.\n\n* The crm_resource command allows individual resources to be reprobed, and\nimplements the \"--ban\" option for moving resources away from nodes.\nThe \"--clear\" option has replaced the \"--unmove\" option. Also, crm_resource\nnow supports OCF tracing when using the \"--force\" option.\n\n* The IPC mechanism restores the ability for members of the haclient group\nto connect to the cluster.\n\n* The Policy Engine daemon allows active nodes in the current membership to\nbe fenced without quorum.\n\n* Policy Engine now suppresses meaningless IDs when displaying anonymous\nclone status, supports maintenance mode for a single node, and correctly\nhandles the recovered resources before they are operated on.\n\n* XML configuration files are now checked for non-printing characters and\nreplaced with their octal equivalent when exporting XML text. Also, a more\nreliable buffer allocation strategy has been implemented to prevent\nlockups.\n\n(BZ#987355)\n\nAdditional bug fixes:\n\n* The \"crm_resource --move\" command was designed for atomic resources and\ncould not handle resources on clones, masters, or slaves present on\nmultiple nodes. Consequently, crm_resource could not obtain enough\ninformation to move a resource and did not perform any action. The \"--ban\"\nand \"--clear\" options have been added to allow the administrator to\ninstruct the cluster unambiguously. Clone, master, and slave resources can\nnow be navigated within the cluster as expected. (BZ#902407)\n\n* The hacluster user account did not have a user identification (UID) or\ngroup identification (GID) number reserved on the system. Thus, UID and GID\nvalues were picked randomly during the installation process. The UID and\nGID number 189 was reserved for hacluster and is now used consistently for\nall installations. (BZ#908450)\n\n* Certain clusters used node host names that did not match the output of\nthe \"uname -n\" command. Thus, the default node name used by the crm_standby\nand crm_failcount commands was incorrect and caused the cluster to ignore\nthe update by the administrator. The crm_node command is now used instead\nof the uname utility in helper scripts. As a result, the cluster behaves as\nexpected. (BZ#913093)\n\n* Due to incorrect return code handling, internal recovery logic of the\ncrm_mon utility was not executed when a configuration updated failed to\napply, leading to an assertion failure. Return codes are now checked\ncorrectly, and the recovery of an expected error state is now handled\ntransparently. (BZ#951371)\n\n* cman\u0027s automatic unfencing feature failed when combined with Pacemaker.\nSupport for automated unfencing in Pacemaker has been added, and the\nunwanted behavior no longer occurs. (BZ#996850)\n\nAll pacemaker users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1635", "url": "https://access.redhat.com/errata/RHSA-2013:1635" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "891922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" }, { "category": "external", "summary": "902407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=902407" }, { "category": "external", "summary": "902459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=902459" }, { "category": "external", "summary": "996850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996850" }, { "category": "external", "summary": "997346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=997346" }, { "category": "external", "summary": "1011618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1011618" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1635.json" } ], "title": "Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T06:55:24+00:00", "generator": { "date": "2024-11-22T06:55:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1635", "initial_release_date": "2013-11-20T16:41:00+00:00", "revision_history": [ { "date": "2013-11-20T16:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-20T16:53:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:55:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability (v. 6)", "product": { "name": "Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage (v. 6)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pacemaker-0:1.1.10-14.el6.src", "product": { "name": "pacemaker-0:1.1.10-14.el6.src", "product_id": "pacemaker-0:1.1.10-14.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker@1.1.10-14.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "pacemaker-remote-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-remote-0:1.1.10-14.el6.i686", "product_id": "pacemaker-remote-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-remote@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-debuginfo-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.i686", "product_id": "pacemaker-debuginfo-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-debuginfo@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-doc-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-doc-0:1.1.10-14.el6.i686", "product_id": "pacemaker-doc-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-doc@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-cts-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-cts-0:1.1.10-14.el6.i686", "product_id": "pacemaker-cts-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cts@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-libs-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-libs-0:1.1.10-14.el6.i686", "product_id": "pacemaker-libs-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-0:1.1.10-14.el6.i686", "product_id": "pacemaker-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "product_id": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cluster-libs@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-cli-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-cli-0:1.1.10-14.el6.i686", "product_id": "pacemaker-cli-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cli@1.1.10-14.el6?arch=i686" } } }, { "category": "product_version", "name": "pacemaker-libs-devel-0:1.1.10-14.el6.i686", "product": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.i686", "product_id": "pacemaker-libs-devel-0:1.1.10-14.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs-devel@1.1.10-14.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "pacemaker-remote-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-remote-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-remote-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-remote@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-debuginfo@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-doc-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-doc-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-doc-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-doc@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-cts-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-cts-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-cts-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cts@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-libs-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-libs-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-libs-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cluster-libs@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-cli-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-cli-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-cli-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-cli@1.1.10-14.el6?arch=x86_64" } } }, { "category": "product_version", "name": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "product": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "product_id": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pacemaker-libs-devel@1.1.10-14.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.src as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.src" }, "product_reference": "pacemaker-0:1.1.10-14.el6.src", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cli-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cli-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cts-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cts-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-debuginfo-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-doc-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-doc-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-libs-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-libs-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-libs-devel-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-remote-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 6)", "product_id": "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-remote-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-HighAvailability" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.src as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.src" }, "product_reference": "pacemaker-0:1.1.10-14.el6.src", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cli-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cli-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cts-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cts-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-debuginfo-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-doc-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-doc-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-libs-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-libs-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-libs-devel-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-remote-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 6)", "product_id": "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-remote-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-ResilientStorage" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-0:1.1.10-14.el6.src" }, "product_reference": "pacemaker-0:1.1.10-14.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cli-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cli-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cli-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-cts-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-cts-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-cts-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-debuginfo-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-doc-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-doc-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-doc-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-libs-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-libs-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-libs-devel-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.10-14.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.i686" }, "product_reference": "pacemaker-remote-0:1.1.10-14.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pacemaker-remote-0:1.1.10-14.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.x86_64" }, "product_reference": "pacemaker-remote-0:1.1.10-14.el6.x86_64", "relates_to_product_reference": "6Server-optional" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0281", "discovery_date": "2013-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "891922" } ], "notes": [ { "category": "description", "text": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).", "title": "Vulnerability description" }, { "category": "summary", "text": "pacemaker: remote DoS when CIB management is enabled caused by use of blocking sockets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.src", "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.src", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-0:1.1.10-14.el6.src", "6Server-optional:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0281" }, { "category": "external", "summary": "RHBZ#891922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0281", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0281" } ], "release_date": "2013-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-20T16:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.src", "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.src", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-0:1.1.10-14.el6.src", "6Server-optional:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1635" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.src", "6Server-HighAvailability:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-HighAvailability:pacemaker-remote-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.src", "6Server-ResilientStorage:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-ResilientStorage:pacemaker-remote-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-0:1.1.10-14.el6.src", "6Server-optional:pacemaker-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cli-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cluster-libs-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-cts-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-debuginfo-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-doc-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-libs-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-libs-devel-0:1.1.10-14.el6.x86_64", "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.i686", "6Server-optional:pacemaker-remote-0:1.1.10-14.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pacemaker: remote DoS when CIB management is enabled caused by use of blocking sockets" } ] }
ghsa-9mhm-24f3-gp3v
Vulnerability from github
Published
2022-05-05 02:48
Modified
2022-05-05 02:48
Details
Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).
{ "affected": [], "aliases": [ "CVE-2013-0281" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-11-23T11:55:00Z", "severity": "MODERATE" }, "details": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).", "id": "GHSA-9mhm-24f3-gp3v", "modified": "2022-05-05T02:48:44Z", "published": "2022-05-05T02:48:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0281" }, { "type": "WEB", "url": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1635.html" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2013-0281
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-0281", "description": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).", "id": "GSD-2013-0281", "references": [ "https://www.suse.com/security/cve/CVE-2013-0281.html", "https://access.redhat.com/errata/RHSA-2013:1635", "https://advisories.mageia.org/CVE-2013-0281.html", "https://linux.oracle.com/cve/CVE-2013-0281.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-0281" ], "details": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).", "id": "GSD-2013-0281", "modified": "2023-12-13T01:22:14.462725Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2013-1635.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-1635.html" }, { "name": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93", "refsource": "MISC", "url": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=891922", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:clusterlabs:pacemaker:1.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0281" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93" }, { "name": "RHSA-2013:1635", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1635.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=891922", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891922" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2019-04-22T17:48Z", "publishedDate": "2013-11-23T11:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.