|Category:||Debian Local Security Checks|
|Title:||Debian: Security Advisory for pacemaker (DSA-4791-1)|
|Summary:||The remote host is missing an update for the 'pacemaker'; package(s) announced via the DSA-4791-1 advisory.|
The remote host is missing an update for the 'pacemaker'
package(s) announced via the DSA-4791-1 advisory.
Ken Gaillot discovered a vulnerability in the Pacemaker cluster
resource manager: If ACLs were configured for users in the haclient
group, the ACL restrictions could be bypassed via unrestricted IPC
communication, resulting in cluster-wide arbitrary code execution with
If the enable-acl cluster option isn't enabled, members of the
group can modify Pacemaker's Cluster Information Base without
restriction, which already gives them these capabilities, so there is
no additional exposure in such a setup.
'pacemaker' package(s) on Debian Linux.
For the stable distribution (buster), this problem has been fixed in
We recommend that you upgrade your pacemaker packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-25654|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.