stonith-ng in pacemaker and cluster-glue passed passwords...
Moderate severity
Unreviewed
Published
Apr 21, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Oct 18, 2021
Published to the GitHub Advisory Database
Apr 21, 2022
Last updated
Jan 27, 2023
stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.
References