-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0417
                            pcs security update
                              25 January 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pcs
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-45442  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2023:0393

Comment: CVSS (Max):  8.8 CVE-2022-45442 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: pcs security update
Advisory ID:       RHSA-2023:0393-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0393
Issue date:        2023-01-24
CVE Names:         CVE-2022-45442 
=====================================================================

1. Summary:

An update for pcs is now available for Red Hat Enterprise Linux 8.2
Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications
Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP
Solutions.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux High Availability E4S (v. 8.2) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux High Availability TUS (v. 8.2) - aarch64, ppc64le, s390x, x86_64

3. Description:

The pcs packages provide a command-line configuration system for the
Pacemaker and Corosync utilities.

Security Fix(es):

* sinatra: Reflected File Download attack (CVE-2022-45442)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2153363 - CVE-2022-45442 sinatra: Reflected File Download attack

6. Package List:

Red Hat Enterprise Linux High Availability E4S (v. 8.2):

Source:
pcs-0.10.4-6.el8_2.4.src.rpm

aarch64:
pcs-0.10.4-6.el8_2.4.aarch64.rpm
pcs-snmp-0.10.4-6.el8_2.4.aarch64.rpm

ppc64le:
pcs-0.10.4-6.el8_2.4.ppc64le.rpm
pcs-snmp-0.10.4-6.el8_2.4.ppc64le.rpm

s390x:
pcs-0.10.4-6.el8_2.4.s390x.rpm
pcs-snmp-0.10.4-6.el8_2.4.s390x.rpm

x86_64:
pcs-0.10.4-6.el8_2.4.x86_64.rpm
pcs-snmp-0.10.4-6.el8_2.4.x86_64.rpm

Red Hat Enterprise Linux High Availability TUS (v. 8.2):

Source:
pcs-0.10.4-6.el8_2.4.src.rpm

aarch64:
pcs-0.10.4-6.el8_2.4.aarch64.rpm
pcs-snmp-0.10.4-6.el8_2.4.aarch64.rpm

ppc64le:
pcs-0.10.4-6.el8_2.4.ppc64le.rpm
pcs-snmp-0.10.4-6.el8_2.4.ppc64le.rpm

s390x:
pcs-0.10.4-6.el8_2.4.s390x.rpm
pcs-snmp-0.10.4-6.el8_2.4.s390x.rpm

x86_64:
pcs-0.10.4-6.el8_2.4.x86_64.rpm
pcs-snmp-0.10.4-6.el8_2.4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-45442
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=YPWO
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=BeYW
-----END PGP SIGNATURE-----