Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6313: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
Red Hat Security Data
#vulnerability#linux#red_hat#auth#ibm#sap

Synopsis

Important: pcs security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for pcs is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

  • pcs: obtaining an authentication token for hacluster user could lead to privilege escalation (CVE-2022-2735)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux High Availability for x86_64 9 x86_64
  • Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 9 x86_64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux Resilient Storage for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux High Availability for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux Resilient Storage for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux Resilient Storage for IBM Power LE - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux High Availability for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux High Availability (for IBM Power LE) - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux High Availability for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux High Availability for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux High Availability for ARM 64 9 aarch64
  • Red Hat Enterprise Linux High Availability (for IBM z Systems) - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux High Availability (for ARM 64) - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Resilient Storage for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux High Availability for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux High Availability for IBM z Systems - 4 years of updates 9.0 s390x
  • Red Hat Enterprise Linux Resilient Storage for x86_64 - 4 years of updates 9.0 x86_64
  • Red Hat Enterprise Linux Resilient Storage for Power LE - 4 years of updates 9.0 ppc64le
  • Red Hat Enterprise Linux Resilient Storage for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2116815 - CVE-2022-2735 pcs: obtaining an authentication token for hacluster user could lead to privilege escalation

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://bugzilla.redhat.com/show_bug.cgi?id=2116839

Red Hat Enterprise Linux High Availability for x86_64 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

x86_64

pcs-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836

pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b

Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

x86_64

pcs-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836

pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b

Red Hat Enterprise Linux Resilient Storage for x86_64 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

x86_64

pcs-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836

pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b

Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

x86_64

pcs-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836

pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b

Red Hat Enterprise Linux Resilient Storage for IBM z Systems 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

s390x

pcs-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17

pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5

Red Hat Enterprise Linux High Availability for IBM z Systems 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

s390x

pcs-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17

pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5

Red Hat Enterprise Linux Resilient Storage for Power, little endian 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

ppc64le

pcs-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70

pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9

Red Hat Enterprise Linux Resilient Storage for IBM Power LE - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

ppc64le

pcs-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70

pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9

Red Hat Enterprise Linux High Availability for Power, little endian 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

ppc64le

pcs-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70

pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9

Red Hat Enterprise Linux High Availability (for IBM Power LE) - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

ppc64le

pcs-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70

pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9

Red Hat Enterprise Linux High Availability for Power LE - Update Services for SAP Solutions 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

ppc64le

pcs-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70

pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9

Red Hat Enterprise Linux High Availability for x86_64 - Update Services for SAP Solutions 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

x86_64

pcs-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836

pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b

Red Hat Enterprise Linux High Availability for ARM 64 9

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

aarch64

pcs-0.11.1-10.el9_0.2.aarch64.rpm

SHA-256: 5014584358b80bae9438034580c61c70d0ecf26928512e121b91530984df83ae

pcs-snmp-0.11.1-10.el9_0.2.aarch64.rpm

SHA-256: f9a26cb4392a9147743f86250e7d52d6e8bca7900832328d266aae76653f92b4

Red Hat Enterprise Linux High Availability (for IBM z Systems) - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

s390x

pcs-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17

pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5

Red Hat Enterprise Linux High Availability (for ARM 64) - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

aarch64

pcs-0.11.1-10.el9_0.2.aarch64.rpm

SHA-256: 5014584358b80bae9438034580c61c70d0ecf26928512e121b91530984df83ae

pcs-snmp-0.11.1-10.el9_0.2.aarch64.rpm

SHA-256: f9a26cb4392a9147743f86250e7d52d6e8bca7900832328d266aae76653f92b4

Red Hat Enterprise Linux Resilient Storage for IBM z Systems - Extended Update Support 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

s390x

pcs-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17

pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5

Red Hat Enterprise Linux High Availability for ARM 64 - 4 years of updates 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

aarch64

pcs-0.11.1-10.el9_0.2.aarch64.rpm

SHA-256: 5014584358b80bae9438034580c61c70d0ecf26928512e121b91530984df83ae

pcs-snmp-0.11.1-10.el9_0.2.aarch64.rpm

SHA-256: f9a26cb4392a9147743f86250e7d52d6e8bca7900832328d266aae76653f92b4

Red Hat Enterprise Linux High Availability for IBM z Systems - 4 years of updates 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

s390x

pcs-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17

pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5

Red Hat Enterprise Linux Resilient Storage for x86_64 - 4 years of updates 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

x86_64

pcs-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836

pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm

SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b

Red Hat Enterprise Linux Resilient Storage for Power LE - 4 years of updates 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

ppc64le

pcs-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70

pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm

SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9

Red Hat Enterprise Linux Resilient Storage for IBM z Systems - 4 years of updates 9.0

SRPM

pcs-0.11.1-10.el9_0.2.src.rpm

SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10

s390x

pcs-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17

pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm

SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5

Related news

CVE-2022-2735: security - ClusterLabs/PCS: [CVE-2022-2735] Obtaining an authentication token for hacluster user leads to privilege escalation.

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

Red Hat Security Advisory 2022-6341-01

Red Hat Security Advisory 2022-6341-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:6341: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation

Red Hat Security Advisory 2022-6314-01

Red Hat Security Advisory 2022-6314-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-6312-01

Red Hat Security Advisory 2022-6312-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-6313-01

Red Hat Security Advisory 2022-6313-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:6314: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation

RHSA-2022:6312: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation