CVE-2022-2735

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
VendorProductVersion
clusterlabspcs
0.10.5 ≤
𝑥
≤ 0.11.3
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pcs
bullseye (security)
0.10.8-1+deb11u1
fixed
bullseye
0.10.8-1+deb11u1
fixed
buster
not-affected
bookworm
0.11.5-1+deb12u1
fixed
sid
0.11.7-2
fixed
trixie
0.11.7-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pcs
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
ignored
jammy
needed
focal
not-affected
bionic
not-affected
xenial
needs-triage
trusty
dne