Name | CVE-2020-25654 |
Description | An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2519-1, DSA-4791-1 |
Debian Bugs | 973254 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
pacemaker (PTS) | stretch (security), stretch (lts), stretch | 1.1.24-0+deb9u1 | fixed |
| buster | 2.0.1-5+deb10u2 | fixed |
| buster (security) | 2.0.1-5+deb10u1 | fixed |
| bullseye | 2.0.5-2 | fixed |
| bookworm | 2.1.5-1+deb12u1 | fixed |
| sid, trixie | 2.1.7-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://www.openwall.com/lists/oss-security/2020/10/27/1
https://bugzilla.redhat.com/show_bug.cgi?id=1888191