keepalived is vulberable to access control bypass. The vulnerability exists due to the lack of sanitization of the message destination, allowing any user to inspect and manipulate any property.
github.com/acassen/keepalived/commit/7977fec0be89ae6fe87405b3f8da2f0b5e415e3d
github.com/acassen/keepalived/pull/2063
lists.fedoraproject.org/archives/list/[email protected]/message/5226RYNMNB7FL4MSJDIBBGPUWH6LMRYV/
lists.fedoraproject.org/archives/list/[email protected]/message/6O2R6EXURJQFPFPYFWRCZLUYVWQCLSZM/
security-tracker.debian.org/tracker/CVE-2021-44225