DEBIAN-CVE-2020-25654

Source
https://security-tracker.debian.org/tracker/CVE-2020-25654
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-25654.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-25654
Upstream
Published
2020-11-24T20:15:11.790Z
Modified
2025-11-19T02:04:39.275988Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.

References

Affected packages

Debian:11 / pacemaker

Package

Name
pacemaker
Purl
pkg:deb/debian/pacemaker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.5~rc2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pacemaker

Package

Name
pacemaker
Purl
pkg:deb/debian/pacemaker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.5~rc2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pacemaker

Package

Name
pacemaker
Purl
pkg:deb/debian/pacemaker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.5~rc2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / pacemaker

Package

Name
pacemaker
Purl
pkg:deb/debian/pacemaker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.5~rc2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}