Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-9754

Опубликовано: 01 сент. 2022
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2022-9754: pcs security update (IMPORTANT)

[0.10.12-6.0.1.el8_6.2]

  • Replace HAM-logo.png with a generic one

[0.10.12-6.el8_6.2]

  • Fixed ruby socket permissions
  • Resolves: rhbz#2116837

Обновленные пакеты

Oracle Linux 8

Oracle Linux x86_64

pcs

0.10.12-6.0.1.el8_6.2

pcs-snmp

0.10.12-6.0.1.el8_6.2

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 8.4
redhat
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 7.8
nvd
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 7.8
debian
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to ...

CVSS3: 7.8
github
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.