Headline
RHSA-2022:6313: Red Hat Security Advisory: pcs security update
An update for pcs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
Synopsis
Important: pcs security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for pcs is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
- pcs: obtaining an authentication token for hacluster user could lead to privilege escalation (CVE-2022-2735)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 9 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 9 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux Resilient Storage for IBM z Systems 9 s390x
- Red Hat Enterprise Linux High Availability for IBM z Systems 9 s390x
- Red Hat Enterprise Linux Resilient Storage for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux Resilient Storage for IBM Power LE - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux High Availability for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux High Availability (for IBM Power LE) - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux High Availability for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux High Availability for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux High Availability for ARM 64 9 aarch64
- Red Hat Enterprise Linux High Availability (for IBM z Systems) - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux High Availability (for ARM 64) - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Resilient Storage for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux High Availability for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux High Availability for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux Resilient Storage for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux Resilient Storage for Power LE - 4 years of updates 9.0 ppc64le
- Red Hat Enterprise Linux Resilient Storage for IBM z Systems - 4 years of updates 9.0 s390x
Fixes
- BZ - 2116815 - CVE-2022-2735 pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
References
- https://access.redhat.com/security/updates/classification/#important
- https://bugzilla.redhat.com/show_bug.cgi?id=2116839
Red Hat Enterprise Linux High Availability for x86_64 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
x86_64
pcs-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836
pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b
Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
x86_64
pcs-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836
pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b
Red Hat Enterprise Linux Resilient Storage for x86_64 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
x86_64
pcs-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836
pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b
Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
x86_64
pcs-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836
pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b
Red Hat Enterprise Linux Resilient Storage for IBM z Systems 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
s390x
pcs-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17
pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5
Red Hat Enterprise Linux High Availability for IBM z Systems 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
s390x
pcs-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17
pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5
Red Hat Enterprise Linux Resilient Storage for Power, little endian 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
ppc64le
pcs-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70
pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9
Red Hat Enterprise Linux Resilient Storage for IBM Power LE - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
ppc64le
pcs-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70
pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9
Red Hat Enterprise Linux High Availability for Power, little endian 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
ppc64le
pcs-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70
pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9
Red Hat Enterprise Linux High Availability (for IBM Power LE) - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
ppc64le
pcs-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70
pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9
Red Hat Enterprise Linux High Availability for Power LE - Update Services for SAP Solutions 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
ppc64le
pcs-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70
pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9
Red Hat Enterprise Linux High Availability for x86_64 - Update Services for SAP Solutions 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
x86_64
pcs-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836
pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b
Red Hat Enterprise Linux High Availability for ARM 64 9
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
aarch64
pcs-0.11.1-10.el9_0.2.aarch64.rpm
SHA-256: 5014584358b80bae9438034580c61c70d0ecf26928512e121b91530984df83ae
pcs-snmp-0.11.1-10.el9_0.2.aarch64.rpm
SHA-256: f9a26cb4392a9147743f86250e7d52d6e8bca7900832328d266aae76653f92b4
Red Hat Enterprise Linux High Availability (for IBM z Systems) - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
s390x
pcs-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17
pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5
Red Hat Enterprise Linux High Availability (for ARM 64) - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
aarch64
pcs-0.11.1-10.el9_0.2.aarch64.rpm
SHA-256: 5014584358b80bae9438034580c61c70d0ecf26928512e121b91530984df83ae
pcs-snmp-0.11.1-10.el9_0.2.aarch64.rpm
SHA-256: f9a26cb4392a9147743f86250e7d52d6e8bca7900832328d266aae76653f92b4
Red Hat Enterprise Linux Resilient Storage for IBM z Systems - Extended Update Support 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
s390x
pcs-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17
pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5
Red Hat Enterprise Linux High Availability for ARM 64 - 4 years of updates 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
aarch64
pcs-0.11.1-10.el9_0.2.aarch64.rpm
SHA-256: 5014584358b80bae9438034580c61c70d0ecf26928512e121b91530984df83ae
pcs-snmp-0.11.1-10.el9_0.2.aarch64.rpm
SHA-256: f9a26cb4392a9147743f86250e7d52d6e8bca7900832328d266aae76653f92b4
Red Hat Enterprise Linux High Availability for IBM z Systems - 4 years of updates 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
s390x
pcs-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17
pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5
Red Hat Enterprise Linux Resilient Storage for x86_64 - 4 years of updates 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
x86_64
pcs-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: 5a698b644fbe8bb168aa3888f0f0741ebb9a4911c7dba9319edef1d65190b836
pcs-snmp-0.11.1-10.el9_0.2.x86_64.rpm
SHA-256: de0f1405b9f59e0f2d45eb6a9c998596a83eadf8e109e66ac5fd21e158a96c7b
Red Hat Enterprise Linux Resilient Storage for Power LE - 4 years of updates 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
ppc64le
pcs-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 0e7a0b952a4cfe47d7cbf0841e80532c46acd64a6fa27b6f3772f5d283d90a70
pcs-snmp-0.11.1-10.el9_0.2.ppc64le.rpm
SHA-256: 2830102581256a3b6af7a1c49827c7d7516b7ed9b8985d2748ce6808fcc8bbb9
Red Hat Enterprise Linux Resilient Storage for IBM z Systems - 4 years of updates 9.0
SRPM
pcs-0.11.1-10.el9_0.2.src.rpm
SHA-256: b7714d11a8ca4d3885632f4d377125240c184a15febc6c77a3420533bb9b2f10
s390x
pcs-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: 6d62b103cbffb5588663869f814c2ed1daae3ffd7a515cb7db4b7d4b277bca17
pcs-snmp-0.11.1-10.el9_0.2.s390x.rpm
SHA-256: d1a4adff7b8cd0299cc343f866fd0aadc3c3311acfc2a4315aed54372107b2e5
Related news
A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
Red Hat Security Advisory 2022-6341-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.
An update for pcs is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
Red Hat Security Advisory 2022-6314-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-6312-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-6313-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a privilege escalation vulnerability.
An update for pcs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation
An update for pcs is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2735: pcs: obtaining an authentication token for hacluster user could lead to privilege escalation