CVE-2020-25654

Source
https://cve.org/CVERecord?id=CVE-2020-25654
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25654.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-25654
Downstream
Related
Published
2020-11-24T20:15:11.790Z
Modified
2026-02-12T07:32:13.162290Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.

References

Affected packages

Git / github.com/clusterlabs/pacemaker

Affected ranges

Type
GIT
Repo
https://github.com/clusterlabs/pacemaker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed

Affected versions

Pacemaker-2.*
Pacemaker-2.0.0
Pacemaker-2.0.1
Pacemaker-2.0.1-rc1
Pacemaker-2.0.1-rc2
Pacemaker-2.0.1-rc3
Pacemaker-2.0.1-rc4
Pacemaker-2.0.1-rc5
Pacemaker-2.0.2
Pacemaker-2.0.2-rc1
Pacemaker-2.0.2-rc2
Pacemaker-2.0.2-rc3
Pacemaker-2.0.3-rc1
Pacemaker-2.0.3-rc2
Pacemaker-2.0.3-rc3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-25654.json"