First published: Wed Feb 28 2018(Updated: )
A security issue was found in pcs deamon that permits an authorized user (with write permission in pcsd) to escalate privileges and write to any file in the system using a malicious REST call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clusterlabs Pacemaker Command Line Interface | <=0.9.164 | |
Clusterlabs Pacemaker Command Line Interface | =0.10 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.5 | |
debian/pcs | 0.10.1-2 0.10.1-2+deb10u1 0.10.8-1+deb11u1 0.11.5-1 0.11.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-1079.
The severity level of CVE-2018-1079 is high.
PCS versions before 0.9.164 and 0.10 are affected by CVE-2018-1079.
An attacker can exploit this vulnerability by making a malicious REST call through the pcsd service.
Yes, Red Hat has released a patch for this vulnerability. Please refer to the provided references for more information.