DSA-5226-1 pcs -- security update

Related Vulnerabilities: CVE-2022-1049   CVE-2022-2735  

Two security issues were discovered in pcs, a corosync and pacemaker configuration tool: CVE-2022-1049 It was discovered that expired accounts were still able to login via PAM. CVE-2022-2735 Ondrej Mular discovered that incorrect permissions on a Unix socket setup for internal communication could result in privilege escalation. For the stable distribution (bullseye), these problems have been fixed in version 0.10.8-1+deb11u1. We recommend that you upgrade your pcs packages. For the detailed security status of pcs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/pcs

Debian Security Advisory

DSA-5226-1 pcs -- security update

Date Reported:
06 Sep 2022
Affected Packages:
pcs
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1018930.
In Mitre's CVE dictionary: CVE-2022-1049, CVE-2022-2735.
More information:

Two security issues were discovered in pcs, a corosync and pacemaker configuration tool:

  • CVE-2022-1049

    It was discovered that expired accounts were still able to login via PAM.

  • CVE-2022-2735

    Ondrej Mular discovered that incorrect permissions on a Unix socket setup for internal communication could result in privilege escalation.

For the stable distribution (bullseye), these problems have been fixed in version 0.10.8-1+deb11u1.

We recommend that you upgrade your pcs packages.

For the detailed security status of pcs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/pcs