CVE-2022-1049

NameCVE-2022-1049
DescriptionA flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon allowed expired accounts and accounts with expired passwords to log in when using PAM authentication. Unprivileged, expired accounts with previously denied access could still log in.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3108-1, DSA-5226-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pcs (PTS)buster0.10.1-2vulnerable
buster (security)0.10.1-2+deb10u1fixed
bullseye (security), bullseye0.10.8-1+deb11u1fixed
bookworm, sid0.11.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pcssourcestretch(not affected)
pcssourcebuster0.10.1-2+deb10u1DLA-3108-1
pcssourcebullseye0.10.8-1+deb11u1DSA-5226-1
pcssource(unstable)0.11.3-1

Notes

[stretch] - pcs <not-affected> (Vulnerable code introduced later, ./pcs/daemon/ not present)
https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5
https://github.com/ClusterLabs/pcs/commit/fb860005117dc9e092649687dfa1304fb423efc5
Introduced by https://github.com/ClusterLabs/pcs/commit/8378cf1a81efc0cd421483234943057e2be0a8ed (v0.10)

Search for package or bug name: Reporting problems