Debian Keepalived vulnerabilities

7 known vulnerabilities affecting debian/keepalived.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM1LOW6

Vulnerabilities

Page 1 of 1
CVE-2024-41184LOWCVSS 9.8fixed in keepalived 1:2.3.2-1 (forky)2024
CVE-2024-41184 [CRITICAL] CVE-2024-41184: keepalived - In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.... In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1, an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 1:2.3.2-1) sid: resolved (fixed in 1:2.3.2-1) trixie: resolved (fixed in
debian
CVE-2021-44225MEDIUMCVSS 5.4fixed in keepalived 1:2.2.4-0.2 (bookworm)2021
CVE-2021-44225 [MEDIUM] CVE-2021-44225: keepalived - In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the... In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property Scope: local bookworm: resolved (fixed in 1:2.2.4-0.2) bullseye: resol
debian
CVE-2018-19115LOWCVSS 9.8fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19115 [CRITICAL] CVE-2018-19115: keepalived - keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP statu... keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap. Scope: local bookworm: resolved (fixed in 1:2.0.10-1) bullseye: resolved (fixed
debian
CVE-2018-19044LOWCVSS 4.7fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19044 [MEDIUM] CVE-2018-19044: keepalived - keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a... keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd. Scope: local bookworm: resolved (fixed
debian
CVE-2018-19046LOWCVSS 4.7fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19046 [MEDIUM] CVE-2018-19046: keepalived - keepalived 2.0.8 didn't check for existing plain files when writing data to a te... keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially l
debian
CVE-2018-19045LOWCVSS 7.5fixed in keepalived 1:2.0.10-1 (bookworm)2018
CVE-2018-19045 [HIGH] CVE-2018-19045: keepalived - keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to... keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information. Scope: local bookworm: resolved (fixed in 1:2.0.10-1) bullseye: resolved (fixed in 1:2.0.10-1) forky: resolved (fixed in 1:2.0.10-1) sid: resolved (fixed in 1:2.0.10-1) trixie: resolved (fixed in 1:2.0.10-1)
debian
CVE-2011-1784LOWCVSS 3.6fixed in keepalived 1:1.2.2-2 (bookworm)2011
CVE-2011-1784 [LOW] CVE-2011-1784: keepalived - The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier use... The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files. Scope: local bookworm: resolved (fixed in 1:1.2.2-2) bullseye: resolved (fixed in 1:1.2.2-2)
debian