CVE-2022-2735
Published: 6 September 2022
A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
Notes
Author | Note |
---|---|
mdeslaur | per upstream, introduced in 0.10.5 |
Priority
Status
Package | Release | Status |
---|---|---|
pcs Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(0.9.164-1)
|
focal |
Not vulnerable
(0.10.4-3)
|
|
jammy |
Needed
|
|
kinetic |
Ignored
(end of life, was needed)
|
|
lunar |
Not vulnerable
(0.11.4-1ubuntu3)
|
|
mantic |
Not vulnerable
(0.11.4-1ubuntu3)
|
|
noble |
Not vulnerable
(0.11.4-1ubuntu3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(0.11.3-2,0.11.4)
|
|
xenial |
Needs triage
|
|
Patches: upstream: https://github.com/ClusterLabs/pcs/commit/de068e2066e377d1cc77edf25aed0198e4c77f7b |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |