Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-2735

Опубликовано: 06 сент. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

РелизСтатусПримечание
bionic

not-affected

0.9.164-1
devel

not-affected

0.11.4-1ubuntu3
esm-apps/bionic

not-affected

0.9.164-1
esm-apps/focal

not-affected

0.10.4-3
esm-apps/jammy

released

0.10.11-2ubuntu3+esm1
esm-apps/xenial

released

0.9.149-1ubuntu1.1+esm1
focal

not-affected

0.10.4-3
jammy

needed

kinetic

ignored

end of life, was needed
lunar

not-affected

0.11.4-1ubuntu3

Показывать по

EPSS

Процентиль: 8%
0.00032
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
redhat
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 7.8
nvd
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

CVSS3: 7.8
debian
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to ...

CVSS3: 7.8
github
около 3 лет назад

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

oracle-oval
около 3 лет назад

ELSA-2022-9754: pcs security update (IMPORTANT)

EPSS

Процентиль: 8%
0.00032
Низкий

7.8 High

CVSS3