-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5226-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff September 06, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : pcs CVE ID : CVE-2022-1049 CVE-2022-2735 Debian Bug : 1018930 Two security issues were discovered in pcs, a corosync and pacemaker configuration tool: CVE-2022-1049 It was discovered that expired accounts were still able to login via PAM. CVE-2022-2735 Ondrej Mular discovered that incorrect permissions on a Unix socket setup for internal communication could result in privilege escalation. For the stable distribution (bullseye), these problems have been fixed in version 0.10.8-1+deb11u1. We recommend that you upgrade your pcs packages. For the detailed security status of pcs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/pcs Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected]