First published: Tue Aug 09 2022(Updated: )
A security issue was discovered in pcs project. It is caused by incorrect permissions on a unix socket used for internal communication between pcs daemons. A privilege escalation could happen by obtaining authentication token for hacluster user. With the hacluster token, an attacker has complete control over the cluster managed by pcs. The bug was introduced in pcs version 0.10.5 by this bz [1] [1] <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1783106">https://bugzilla.redhat.com/show_bug.cgi?id=1783106</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pcs | <=0.10.8-1<=0.11.3-1 | 0.11.3-2 0.10.8-1+deb11u1 |
ClusterLabs pcs | >=0.10.5<=0.11.3 | |
Debian Debian Linux | =11.0 | |
debian/pcs | 0.10.1-2 0.10.1-2+deb10u1 0.10.8-1+deb11u1 0.11.5-1+deb12u1 0.11.6-2 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2022-2735 is a privilege escalation vulnerability in the PCS project.
Vulnerability CVE-2022-2735 occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons.
The severity of vulnerability CVE-2022-2735 is high, with a CVSS score of 7.8.
The following versions of the PCS project are affected: 0.10.1-2, 0.10.1-2+deb10u1, 0.10.8-1+deb11u1, 0.11.5-1, and 0.11.6-1.
To fix vulnerability CVE-2022-2735, update the PCS project to version 0.11.3-2 or higher.