Bugzilla – Bug 1177916
VUL-0: CVE-2020-25654: pacemaker: ACL restrictions bypass
Last modified: 2024-05-29 17:12:48 UTC
via oss-security: Hi All, Pacemaker is a high-availability cluster manager comprising multiple daemon processes that interact with each other and with user requests via IPC. Users must either be root or in the haclient group to access Pacemaker daemon IPC. One of these daemons, pacemaker-based, manages the Pacemaker configuration, known as the Cluster Information Base (CIB). Pacemaker may be built with support for Access Control Lists (ACLs) in which case pacemaker-based applies configured ACLs when processing user requests to read or write any part of the configuration. When ACLs are not in use, any user in the haclient group has full access to the configuration, which effectively gives them the ability to run any code as root. (This is intentional, as the point of a cluster manager is to run arbitrary services.) When ACLs are in use, users still must be in the haclient group, but their read and write access to various parts of the configuration is limited by configured ACLs. The vulnerability is that users may use IPC communication with the various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration. This is not difficult; Pacemaker provides command-line tools to send many types of IPC requests. More details along with patches is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1888191 -- Huzaifa Sidhpurwala / Red Hat Product Security
SUSE-SU-2020:3054-1: An update that solves one vulnerability, contains three features and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: ECO-1611,SLE-12239,SLE-12240 Sources used: SUSE Linux Enterprise High Availability 15-SP2 (src): pacemaker-2.0.4+20200616.2deceaa3a-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:3073-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: SUSE Linux Enterprise High Availability 15-SP1 (src): pacemaker-2.0.1+20190417.13d370ca9-3.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:3080-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: SUSE Linux Enterprise High Availability 15 (src): pacemaker-1.1.18+20180430.b12c320f5-3.27.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:3086-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: SUSE Linux Enterprise Software Development Kit 12-SP5 (src): pacemaker-1.1.23+20200622.28dd98fad-3.9.2 SUSE Linux Enterprise High Availability 12-SP5 (src): pacemaker-1.1.23+20200622.28dd98fad-3.9.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:3089-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: SUSE Linux Enterprise High Availability 12-SP4 (src): pacemaker-1.1.19+20181105.ccd6b5b10-3.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2020:3094-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: SUSE Linux Enterprise High Availability 12-SP3 (src): pacemaker-1.1.16-6.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2020:1782-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: openSUSE Leap 15.2 (src): pacemaker-2.0.4+20200616.2deceaa3a-lp152.2.3.1
openSUSE-SU-2020:1825-1: An update that solves one vulnerability and has three fixes is now available. Category: security (important) Bug References: 1167171,1173668,1175557,1177916 CVE References: CVE-2020-25654 JIRA References: Sources used: openSUSE Leap 15.1 (src): pacemaker-2.0.1+20190417.13d370ca9-lp151.2.16.4
This is an autogenerated message for OBS integration: This bug (1177916) was mentioned in https://build.opensuse.org/request/show/853534 Factory / pacemaker