First published: Fri Mar 25 2022(Updated: )
A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ClusterLabs pcs | <=0.11.2 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/pcs | <=0.10.1-2 | 0.10.1-2+deb10u1 0.10.8-1+deb11u1 0.11.5-1+deb12u1 0.11.6-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1049 is a vulnerability found in the Pacemaker configuration tool (pcs) that allows expired and expired password accounts to login using PAM authentication.
The severity of CVE-2022-1049 is high, with a severity value of 8.8.
CVE-2022-1049 affects systems running pcs version 0.10.1-2 up to and including 0.11.2, as well as ClusterLabs pcs and Debian Debian Linux versions 10.0 and 11.0.
To fix CVE-2022-1049, upgrade the pcs package to version 0.10.1-2+deb10u1, 0.10.8-1+deb11u1, 0.11.5-1, or 0.11.6-1, depending on your system.
You can find more information about CVE-2022-1049 at the following references: [link1], [link2], [link3].