Vulnerability Description
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linbit | Csync2 | <= 2.0 |
References
- https://github.com/LINBIT/csync2/commit/416f1de878ef97e27e27508914f7ba8599a0be22PatchVendor Advisory
- https://github.com/LINBIT/csync2/commit/416f1de878ef97e27e27508914f7ba8599a0be22PatchVendor Advisory
FAQ
What is CVE-2019-15522?
CVE-2019-15522 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
How severe is CVE-2019-15522?
CVE-2019-15522 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-15522?
Check the references section above for vendor advisories and patch information. Affected products include: Linbit Csync2.