RedHat: RHSA-2022-7935:01 Moderate: pcs security, bug fix,
Summary
The pcs packages provide a command-line configuration system for the
Pacemaker and Corosync utilities.
Security Fix(es):
* pcs: improper authentication via PAM (CVE-2022-1049)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 9.1 Release Notes linked from the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2022-1049 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index
Package List
Red Hat Enterprise Linux High Availability (v. 9):
Source:
pcs-0.11.3-4.el9.src.rpm
aarch64:
pcs-0.11.3-4.el9.aarch64.rpm
pcs-snmp-0.11.3-4.el9.aarch64.rpm
ppc64le:
pcs-0.11.3-4.el9.ppc64le.rpm
pcs-snmp-0.11.3-4.el9.ppc64le.rpm
s390x:
pcs-0.11.3-4.el9.s390x.rpm
pcs-snmp-0.11.3-4.el9.s390x.rpm
x86_64:
pcs-0.11.3-4.el9.x86_64.rpm
pcs-snmp-0.11.3-4.el9.x86_64.rpm
Red Hat Enterprise Linux Resilient Storage (v. 9):
Source:
pcs-0.11.3-4.el9.src.rpm
ppc64le:
pcs-0.11.3-4.el9.ppc64le.rpm
pcs-snmp-0.11.3-4.el9.ppc64le.rpm
s390x:
pcs-0.11.3-4.el9.s390x.rpm
pcs-snmp-0.11.3-4.el9.s390x.rpm
x86_64:
pcs-0.11.3-4.el9.x86_64.rpm
pcs-snmp-0.11.3-4.el9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for pcs is now available for Red Hat Enterprise Linux 9.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux High Availability (v. 9) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Resilient Storage (v. 9) - ppc64le, s390x, x86_64
Bugs Fixed
1301204 - Some stonith resource changes require "pcs resource"
2024522 - [RFE] Provide a way to add a scsi **mpath** fencing device to a cluster without requiring a restart of all cluster resources
2026725 - booth: pcs should check that '/etc/booth' exists
2029844 - [WebUI] Overhaul "Add existing cluster" wizard
2039884 - [WebUI][RFE] support SBD management
2053177 - booth: pcs should validate ticket names
2054671 - [RFE] Generate UUID for each cluster
2058243 - pcs booth ticket add does not recognize mode option
2058246 - Prevent fence_sbd in combination with stonith-watchdog-timeout>0
2058247 - [RFE] Provide easier management of constraints created by pcs move command
2058251 - [RFE] Provide method to export commands to create all resources
2058252 - [RFE] Provide method to export commands to create all fence devices
2059122 - Hiding Server Name HTTP header from TornadoServer(used in pcs/pcsd)
2059142 - [WebUI][RFE] Allow to change position of resource inside group
2059145 - [WebUI] Loading cluster status (or cluster list) does not start automatically immediately after logout and login
2059148 - [WebUI][RFE] add support for modification of utilization attributes in nodes and resources
2059149 - [WebUI][RFE] add support to add/remove resource meta attribute
2059177 - [WebUI] Wrong label for full permissions
2059501 - pcs rebase bz for 9.1
2064818 - man pcs suggests using 'stickiness' instead of 'resource-stickiness' in 'pcs resource meta'
2066629 - CVE-2022-1049 pcs: improper authentication via PAM
2076585 - [WebUI][RFE] add support to add/remove node attribute
2095695 - Cannot remove a quorum device
2097778 - Pcs WebUI - CSP headers do not restrict script source
2102663 - 'pcs resource restart' fails with a traceback