Description
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2439 | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext. |
Github GHSA |
GHSA-4jhc-wjr3-pwh2 | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T17:02:07.440Z
Reserved: 2020-12-13T00:00:00.000Z
Link: CVE-2020-35211
No data.
Status : Modified
Published: 2021-12-16T20:15:07.333
Modified: 2024-11-21T05:27:01.337
Link: CVE-2020-35211
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA