2024-04-16 14:26:14 +00:00

167 lines
6.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20235630",
"Version": "oval:org.altlinux.errata:def:20235630",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-5630: package `pcs` update to version 0.11.5-alt2.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-5630",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-5630",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-05543",
"RefURL": "https://bdu.fstec.ru/vul/2022-05543",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05554",
"RefURL": "https://bdu.fstec.ru/vul/2022-05554",
"Source": "BDU"
},
{
"RefID": "CVE-2022-1049",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1049",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2735",
"Source": "CVE"
}
],
"Description": "This update upgrades pcs to version 0.11.5-alt2.1. \nSecurity Fix(es):\n\n * BDU:2022-05543: Уязвимость утилиты для настройки программ corosync/pacemaker PCS, связанная с недостатками процедуры аутентификации, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05554: Уязвимость утилиты для настройки corosync/pacemaker PCS, связанная с недостатками процедуры аутентификации, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2022-1049: A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.\n\n * CVE-2022-2735: A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the \"hacluster\" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.\n\n * #40854: unable to run command /usr/lib/pacemaker/pacemaker-schedulerd metadata: No such file or directory",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-09-18"
},
"Updated": {
"Date": "2023-09-18"
},
"BDUs": [
{
"ID": "BDU:2022-05543",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2022-05543",
"Impact": "High",
"Public": "20220906"
},
{
"ID": "BDU:2022-05554",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2022-05554",
"Impact": "High",
"Public": "20220906"
}
],
"CVEs": [
{
"ID": "CVE-2022-1049",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1049",
"Impact": "High",
"Public": "20220325"
},
{
"ID": "CVE-2022-2735",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2735",
"Impact": "High",
"Public": "20220906"
}
],
"Bugzilla": [
{
"ID": "40854",
"Href": "https://bugzilla.altlinux.org/40854",
"Data": "unable to run command /usr/lib/pacemaker/pacemaker-schedulerd metadata: No such file or directory"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20235630001",
"Comment": "pcs is earlier than 1:0.11.5-alt2.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235630002",
"Comment": "python3-module-pcs is earlier than 1:0.11.5-alt2.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235630003",
"Comment": "python3-module-snmp is earlier than 1:0.11.5-alt2.1"
}
]
}
]
}
}
]
}