vulnerability
Amazon Linux AMI 2: CVE-2020-25654: Security patch for pacemaker (ALAS-2021-1583)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Nov 24, 2020 | Jan 8, 2021 | Sep 30, 2022 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Nov 24, 2020
Added
Jan 8, 2021
Modified
Sep 30, 2022
Description
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
Solutions
amazon-linux-ami-2-upgrade-pacemakeramazon-linux-ami-2-upgrade-pacemaker-cliamazon-linux-ami-2-upgrade-pacemaker-cluster-libsamazon-linux-ami-2-upgrade-pacemaker-ctsamazon-linux-ami-2-upgrade-pacemaker-debuginfoamazon-linux-ami-2-upgrade-pacemaker-docamazon-linux-ami-2-upgrade-pacemaker-libsamazon-linux-ami-2-upgrade-pacemaker-libs-develamazon-linux-ami-2-upgrade-pacemaker-nagios-plugins-metadataamazon-linux-ami-2-upgrade-pacemaker-remote
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.