Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.0417 pcs security update 25 January 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: pcs Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-45442 Original Bulletin: https://access.redhat.com/errata/RHSA-2023:0393 Comment: CVSS (Max): 8.8 CVE-2022-45442 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: pcs security update Advisory ID: RHSA-2023:0393-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:0393 Issue date: 2023-01-24 CVE Names: CVE-2022-45442 ===================================================================== 1. Summary: An update for pcs is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux High Availability E4S (v. 8.2) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux High Availability TUS (v. 8.2) - aarch64, ppc64le, s390x, x86_64 3. Description: The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Security Fix(es): * sinatra: Reflected File Download attack (CVE-2022-45442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2153363 - CVE-2022-45442 sinatra: Reflected File Download attack 6. Package List: Red Hat Enterprise Linux High Availability E4S (v. 8.2): Source: pcs-0.10.4-6.el8_2.4.src.rpm aarch64: pcs-0.10.4-6.el8_2.4.aarch64.rpm pcs-snmp-0.10.4-6.el8_2.4.aarch64.rpm ppc64le: pcs-0.10.4-6.el8_2.4.ppc64le.rpm pcs-snmp-0.10.4-6.el8_2.4.ppc64le.rpm s390x: pcs-0.10.4-6.el8_2.4.s390x.rpm pcs-snmp-0.10.4-6.el8_2.4.s390x.rpm x86_64: pcs-0.10.4-6.el8_2.4.x86_64.rpm pcs-snmp-0.10.4-6.el8_2.4.x86_64.rpm Red Hat Enterprise Linux High Availability TUS (v. 8.2): Source: pcs-0.10.4-6.el8_2.4.src.rpm aarch64: pcs-0.10.4-6.el8_2.4.aarch64.rpm pcs-snmp-0.10.4-6.el8_2.4.aarch64.rpm ppc64le: pcs-0.10.4-6.el8_2.4.ppc64le.rpm pcs-snmp-0.10.4-6.el8_2.4.ppc64le.rpm s390x: pcs-0.10.4-6.el8_2.4.s390x.rpm pcs-snmp-0.10.4-6.el8_2.4.s390x.rpm x86_64: pcs-0.10.4-6.el8_2.4.x86_64.rpm pcs-snmp-0.10.4-6.el8_2.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-45442 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY8+0PNzjgjWX9erEAQgNkA//edHjahjCaKOYb3cR/ahSnNXjhhl/x4nM lX18WSd2PpJ1KvUbVBXo2BL0jlfDBwTpFvdJmzTcxjrEM10i0B84c4DJDJfmcdI0 CWnh85UpwUpTGvqhxUpf8EWDNh6yrLrdDh1RjBc765/Ldy4ai67cqoCv2FzkCBRo sPtPQBLt6eVME/39tarbX3mwN6JUGPEiXmSkKv2KqN+Jf4kLzLjrs4Cj0/V0WXrW MZwMnVnfKqL+XerOCincbCvwfNByfN0seVj9wIkOaAu+Zz4YASXzZl8wtbkN3Gr5 UV0vZ68MegZPTLsvre+inn2DIQfBOH1xxN352Vz1q3lBu2TnyC/mC0Leun2lK7bY rbG7pz3piN4xOZNvOcPl0id0d6DMauDdZnNv9kF/A7K9EbqooMaR/H1I3CgsqIuo p3Mvrfx7GuLFUyGNkUMV5Gkm9Gdc64JLXFVA3kqTitp36dr2APx//D5KDbAZfWG3 fnTJgIRovcE0+/dt6RfFkFDufBh7vKYJLIf/2+GBKnDjTEXzjus627VSBXx3Z2wM 4fWCZe7YfYvQY0lxQMOKIXC1l5T+9LFgOnl7FcsgU/krR17pwU0zRBKOdKC8SsPa R1Lz0b/NKPh6ABykjKyoI/irdnp8Xy8M++98UsQHkI4oMvebl/nsx5BAjlzanBSZ FhiArI4ug2Y= =YPWO - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY9CHxskNZI30y1K9AQgyRA/+NjGwM5Y+WPK0hR9gWTZFHypO36WrwaVS DyNa89REFi51qFg4cIet8KwozluahUzvDlV+aZfqAGvERDx7NzH0eIp8ZepYm0S0 1wkdRJQv+Duy41OV0Ni3inLD3fjcz2EPeJO8ggamDF4lvyELHaymkl2E91jAbi9N kBqqmKcIObUuH8McZBxg7FoKaF1nZU5LMfUG6DPWudxCBIZwqOrIwrQ0RhV7aWCU P5XaztzNOFErmw5Y9dxvSkzrNOkKsoGgoEUKh38ITMY4GKacWKY1NWxVfgE330ae luMQYZpHxLBr8Uvd+P6FwXGf5qRmkb8bCxMv+D6K94I3lcf8bHay0MhGDtSGxvNc NyagsegWJHxNiePXrV+ClOlUwjCLsPZCEErYqcAZr8vH87YwiCjKrHHujOXnB3NQ 4IzDxpeO1pcVxB6zK5N6AGyTueCJciYt+4Nt2tayjPeFNtiz6NpVdHspRQTaps73 USK6zuyxFnikzOEabOHa37nxMn7LnwDQzXc1CymAoyKk7yXnj072XbVz/jwTJ+Pb pY4CPV/ad0wfa7KpAEapySyhx1qA1RjadaFUBVVVIQOXZq3Moxy9hcAvwwPL7ddr XnoITvCglRcyIjRGhNx9xNK6ac/Ti5s0oro8o9Wb71kSgxx4BivcnrYgdmz/bmzF mhuXeA+e5No= =BeYW -----END PGP SIGNATURE-----