{"affected":[{"ecosystem_specific":{"binaries":[{"libpacemaker3":"1.1.15-23.9.1","pacemaker":"1.1.15-23.9.1","pacemaker-cli":"1.1.15-23.9.1","pacemaker-cts":"1.1.15-23.9.1","pacemaker-remote":"1.1.15-23.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP2","name":"pacemaker","purl":"pkg:rpm/suse/pacemaker&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.15-23.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for pacemaker fixes the following issues:\n\n- CVE-2018-16877: Fixed an issue with insufficient local IPC client-server authentication on the client's side (bsc#1131356).\n- CVE-2018-16878: Fixed a denial of service related to insufficient verification of uncontrolled processes (bsc#1131353).\n","id":"SUSE-SU-2020:1072-1","modified":"2020-04-22T17:37:02Z","published":"2020-04-22T17:37:02Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20201072-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1131353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1131356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16878"}],"related":["CVE-2018-16877","CVE-2018-16878"],"summary":"Security update for pacemaker","upstream":["CVE-2018-16877","CVE-2018-16878"]}