• [SECURITY] [DSA 4791-1] pacemaker security update

    From Moritz Muehlenhoff@21:1/5 to All on Fri Nov 13 11:10:01 2020
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-4791-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 13, 2020 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : pacemaker
    CVE ID : CVE-2020-25654
    Debian Bug : 973254

    Ken Gaillot discovered a vulnerability in the Pacemaker cluster
    resource manager: If ACLs were configured for users in the "haclient"
    group, the ACL restrictions could be bypassed via unrestricted IPC communication, resulting in cluster-wide arbitrary code execution with
    root privileges.

    If the "enable-acl" cluster option isn't enabled, members of the
    "haclient" group can modify Pacemaker's Cluster Information Base without restriction, which already gives them these capabilities, so there is
    no additional exposure in such a setup.

    For the stable distribution (buster), this problem has been fixed in
    version 2.0.1-5+deb10u1.

    We recommend that you upgrade your pacemaker packages.

    For the detailed security status of pacemaker please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/pacemaker

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+uVnoACgkQEMKTtsN8 TjZWLg//VcnK6Q9FIkqb48ACRqjHyin6bAhKOWWkzd0StbmlYvSChZeC9FPiks8I MGO3+r3P0Rby6r086CAvustauYASDEGM5Vn2rjIYdB1PNu7mZSjgCrZHA8WTbqr6 l2UBG/1I0EiN6rleCrp7FlkyyXqkuTmYlBl9WxGjIBcV52+mdlSkgXqDtdG2nEom mpK1IHfBodljfMQxVpoGxNIZv0YTu0jzWVH17J85W7sQlFIXzIfq3CxwSyEx7GDB yAmmGuKY0jOVnqcSCGgsgiBHSDc709+q6dpGkm95317qHneKvxrbpshmWMbNjV3T +NOdAgg285gTkECxpTqthz8dRJKQWc9ZjD8L0eAwEs6aArMmsuXKuL+pS/F/C+M9 FvXEeI1R7Q2xgStqk8rf/wojLkBp3LKXN7xDsQjpDjb/IDli1tlRD3eNavmWb2/C gUBbjt5lyYvsRRMShAb3YN169KQ7aSo/ShoKqxoWgWUia2hggT8CuGeoVaGNDuD+ 1gMwXMO75rhEy3fWOAIpJwWt2IEh3Pgels9Y7du8Xk8TaWwwmYunrw1cHhqJbmeZ Z6hf3qfpRykYUG6lxyxSFsP3fKjCNZ4DD30iS0GIxosZEuAiQhuFHi5l2IdPuTuA aAsqv1zxidMif0OH8Ia/dDA7BFSDupShe1Mn6DoQkrv5JylRCoM=
    =KMeH
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)