Bug 1888191 (CVE-2020-25654)

Summary: CVE-2020-25654 pacemaker: ACL restrictions bypass
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: andrew, anprice, clumens, cluster-maint, dbecker, fedora, huzaifas, hvyas, jjoyce, jschluet, kgaillot, kwenning, lhh, lpeer, mburns, puebele, sclewis, security-response-team, slinaber
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pacemaker 1.1.24-rc1, pacemaker 2.0.5-rc2 Doc Type: If docs needed, set a value
Doc Text:
An ACL bypass flaw was found in Pacemaker. This flaw allows an attacker with a local account on the cluster and in the haclient group to use IPC communication with various daemons to directly perform certain tasks that would be prevented if they had gone through configured ACLs. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-12-15 12:47:04 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1889582, 1891528, 1891529, 1891718, 1891719, 1892140    
Bug Blocks: 1887376    
Attachments:
Description Flags
Fix for pacemaker CVE-2020-25654 (upstream master branch as of 2020-10-18)
none
Fix for pacemaker CVE-2020-25654 (upstream 2.0.4 release)
none
Fix for pacemaker CVE-2020-25654 (upstream 2.0.3 release)
none
Fix for pacemaker CVE-2020-25654 (upstream 1.1.23 release) none

Description Michael Kaplan 2020-10-14 10:49:00 UTC
An acl bypass flaw was found in pacemaker. When ACLs are not in use, any user in the haclient group has full access to the configuration, which effectively gives them the ability to run any code as root. 

When ACLs are in use, users still must be in the haclient group, but their read and write access to various parts of the configuration is limited by configured ACLs.

The vulnerability is that users may use IPC communication with the various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.

Comment 7 Ken Gaillot 2020-10-19 20:20:57 UTC
Created attachment 1722698 [details]
Fix for pacemaker CVE-2020-25654 (upstream master branch as of 2020-10-18)

Comment 8 Ken Gaillot 2020-10-19 20:21:48 UTC
Created attachment 1722699 [details]
Fix for pacemaker CVE-2020-25654 (upstream 2.0.4 release)

Comment 9 Ken Gaillot 2020-10-19 20:22:14 UTC
Created attachment 1722700 [details]
Fix for pacemaker CVE-2020-25654 (upstream 2.0.3 release)

Comment 10 Ken Gaillot 2020-10-19 20:22:45 UTC
Created attachment 1722701 [details]
Fix for pacemaker CVE-2020-25654 (upstream 1.1.23 release)

Comment 11 Ken Gaillot 2020-10-19 20:25:04 UTC
Patches attached. Each patch is the same fix, but applicable to different points in the upstream code base (master branch as of this morning, the two most recent upstream releases 2.0.4 and 2.0.3, and the most recent release of the previous upstream major series 1.1.23).

Comment 21 Huzaifa S. Sidhpurwala 2020-10-27 07:51:27 UTC
Created pacemaker tracking bugs for this issue:

Affects: fedora-all [bug 1891718]
Affects: openstack-rdo [bug 1891719]

Comment 31 Huzaifa S. Sidhpurwala 2020-10-28 02:26:41 UTC
Acknowledgments:

Name: Ken Gaillot (Red Hat)

Comment 44 errata-xmlrpc 2020-12-15 08:43:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2020:5423 https://access.redhat.com/errata/RHSA-2020:5423

Comment 45 errata-xmlrpc 2020-12-15 11:19:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:5453 https://access.redhat.com/errata/RHSA-2020:5453

Comment 46 Product Security DevOps Team 2020-12-15 12:47:04 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-25654

Comment 47 errata-xmlrpc 2020-12-15 17:03:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:5487 https://access.redhat.com/errata/RHSA-2020:5487

Comment 48 RaTasha Tillery-Smith 2021-02-10 14:38:55 UTC
Statement:

Red Hat Gluster Storage 3 no longer maintains its own version of Pacemaker. The prerequisite is to enable Red Hat Enterprise Linux High Availability (for RHEL X Server)" repository. The fix will be consumed from RHEL High Availability repository.