CVE-2020-25654

An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
References
Link Resource
https://lists.clusterlabs.org/pipermail/users/2020-October/027840.html Mailing List Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1888191 Issue Tracking Third Party Advisory
https://seclists.org/oss-sec/2020/q4/83 Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/01/msg00007.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clusterlabs:pacemaker:2.0.5:rc1:*:*:*:*:*:*
cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*
cpe:2.3:a:clusterlabs:pacemaker:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2020-11-24 12:15

Updated : 2022-10-21 12:23


NVD link : CVE-2020-25654

Mitre link : CVE-2020-25654


JSON object : View

CWE
CWE-284

Improper Access Control

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

clusterlabs

  • pacemaker