Debian Keepalived vulnerabilities
7 known vulnerabilities affecting debian/keepalived.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM1LOW6
Vulnerabilities
Page 1 of 1
CVE-2024-41184LOWCVSS 9.8fixed in keepalived 1:2.3.2-1 (forky)2024
CVE-2024-41184 [CRITICAL] CVE-2024-41184: keepalived - In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3....
In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1, an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1:2.3.2-1)
sid: resolved (fixed in 1:2.3.2-1)
trixie: resolved (fixed in
debian
CVE-2021-44225MEDIUMCVSS 5.4fixed in keepalived 1:2.2.4-0.2 (bookworm)2021
CVE-2021-44225 [MEDIUM] CVE-2021-44225: keepalived - In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the...
In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property
Scope: local
bookworm: resolved (fixed in 1:2.2.4-0.2)
bullseye: resol
debian
CVE-2018-19115LOWCVSS 9.8fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19115 [CRITICAL] CVE-2018-19115: keepalived - keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP statu...
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
Scope: local
bookworm: resolved (fixed in 1:2.0.10-1)
bullseye: resolved (fixed
debian
CVE-2018-19044LOWCVSS 4.7fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19044 [MEDIUM] CVE-2018-19044: keepalived - keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a...
keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
Scope: local
bookworm: resolved (fixed
debian
CVE-2018-19046LOWCVSS 4.7fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19046 [MEDIUM] CVE-2018-19046: keepalived - keepalived 2.0.8 didn't check for existing plain files when writing data to a te...
keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially l
debian
CVE-2018-19045LOWCVSS 7.5fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19045 [HIGH] CVE-2018-19045: keepalived - keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to...
keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information.
Scope: local
bookworm: resolved (fixed in 1:2.0.10-1)
bullseye: resolved (fixed in 1:2.0.10-1)
forky: resolved (fixed in 1:2.0.10-1)
sid: resolved (fixed in 1:2.0.10-1)
trixie: resolved (fixed in 1:2.0.10-1)
debian
CVE-2011-1784LOWCVSS 3.6fixed in keepalived 1:1.2.2-2 (bookworm)2011
CVE-2011-1784 [LOW] CVE-2011-1784: keepalived - The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier use...
The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files.
Scope: local
bookworm: resolved (fixed in 1:1.2.2-2)
bullseye: resolved (fixed in 1:1.2.2-2)
debian