CVE-2020-25654

NameCVE-2020-25654
DescriptionAn ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2519-1, DSA-4791-1
NVD severityhigh
Debian Bugs973254

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pacemaker (PTS)stretch1.1.16-1vulnerable
stretch (security)1.1.24-0+deb9u1fixed
buster, buster (security)2.0.1-5+deb10u1fixed
bookworm, sid, bullseye2.0.5-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pacemakersourcestretch1.1.24-0+deb9u1DLA-2519-1
pacemakersourcebuster2.0.1-5+deb10u1DSA-4791-1
pacemakersource(unstable)2.0.5~rc2-1973254

Notes

https://www.openwall.com/lists/oss-security/2020/10/27/1
https://bugzilla.redhat.com/show_bug.cgi?id=1888191

Search for package or bug name: Reporting problems