Debian: DSA-5226-1: pcs security update | LinuxSecurity.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5226-1                   [email protected]
https://www.debian.org/security/                       Moritz Muehlenhoff
September 06, 2022                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : pcs
CVE ID         : CVE-2022-1049 CVE-2022-2735
Debian Bug     : 1018930

Two security issues were discovered in pcs, a corosync and pacemaker
configuration tool:

CVE-2022-1049

    It was discovered that expired accounts were still able to login
    via PAM.

CVE-2022-2735

    Ondrej Mular discovered that incorrect permissions on a Unix socket
    setup for internal communication could result in privilege escalation.

For the stable distribution (bullseye), these problems have been fixed in
version 0.10.8-1+deb11u1.

We recommend that you upgrade your pcs packages.

For the detailed security status of pcs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pcs

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5226-1: pcs security update

September 6, 2022

Summary

Two security issues were discovered in pcs, a corosync and pacemaker
configuration tool:

CVE-2022-1049

It was discovered that expired accounts were still able to login
via PAM.

CVE-2022-2735

Ondrej Mular discovered that incorrect permissions on a Unix socket
setup for internal communication could result in privilege escalation.

For the stable distribution (bullseye), these problems have been fixed in
version 0.10.8-1+deb11u1.

We recommend that you upgrade your pcs packages.

For the detailed security status of pcs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pcs

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
Package : pcs
CVE ID : CVE-2022-1049 CVE-2022-2735
Debian Bug : 1018930

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.