{"id":"CVE-2018-16878","details":"A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS","modified":"2026-04-16T04:36:36.340773527Z","published":"2019-04-18T18:29:00.390Z","related":["SUSE-SU-2019:1047-1","SUSE-SU-2019:1108-1","SUSE-SU-2019:1209-1","SUSE-SU-2019:2268-1","SUSE-SU-2020:1072-1","openSUSE-SU-2019:1400-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3GCWFO7GL6MBU6C4BGFO3P6L77DIBBF3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FY4M4RMIG2POKC6OOFQODGKPRYXHET2F/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HR6QUYGML735EI3HEEHYRDW7EG73BUH2/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/108039"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-09"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00034.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3952-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00012.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1278"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1279"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16878"},{"type":"FIX","url":"https://github.com/ClusterLabs/pacemaker/pull/1749"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/clusterlabs/pacemaker","events":[{"introduced":"0"},{"last_affected":"9e909a5bdda5c14cd70173b7f33a389b402dee45"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.1"}]}}],"versions":["Pacemaker-0.6.0","Pacemaker-0.6.1","Pacemaker-0.6.2","Pacemaker-0.6.3","Pacemaker-0.6.5","Pacemaker-1.1.10","Pacemaker-1.1.10-rc1","Pacemaker-1.1.10-rc2","Pacemaker-1.1.10-rc3","Pacemaker-1.1.10-rc4","Pacemaker-1.1.10-rc5","Pacemaker-1.1.10-rc6","Pacemaker-1.1.10-rc7","Pacemaker-1.1.11-rc1","Pacemaker-1.1.11-rc3","Pacemaker-1.1.13-rc1","Pacemaker-1.1.14-rc4","Pacemaker-1.1.6","Pacemaker-1.1.6.1","Pacemaker-1.1.7","Pacemaker-1.1.8","Pacemaker-1.1.9","Pacemaker-2.0.0","Pacemaker-2.0.0-rc1","Pacemaker-2.0.0-rc2","Pacemaker-2.0.0-rc3","Pacemaker-2.0.0-rc4","Pacemaker-2.0.0-rc5","Pacemaker-2.0.0-rc6","Pacemaker-2.0.1","Pacemaker-2.0.1-rc1","Pacemaker-2.0.1-rc2","Pacemaker-2.0.1-rc3","Pacemaker-2.0.1-rc4","Pacemaker-2.0.1-rc5","RHEL6.3","RHEL6.4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"28"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16878.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}