- Issued:
- 2024-05-22
- Updated:
- 2024-05-22
RHSA-2024:2953 - Security Advisory
Synopsis
Moderate: pcs security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for pcs is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
- rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing (CVE-2024-25126)
- rubygem-rack: Possible DoS Vulnerability with Range Header in Rack (CVE-2024-26141)
- rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing (CVE-2024-26146)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 8 x86_64
- Red Hat Enterprise Linux High Availability for ARM 64 8 aarch64
- Red Hat Enterprise Linux Resilient Storage for x86_64 8 x86_64
- Red Hat Enterprise Linux Resilient Storage for IBM z Systems 8 s390x
- Red Hat Enterprise Linux High Availability for IBM z Systems 8 s390x
- Red Hat Enterprise Linux Resilient Storage for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux High Availability for Power, little endian 8 ppc64le
Fixes
- BZ - 2265593 - CVE-2024-25126 rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing
- BZ - 2265594 - CVE-2024-26141 rubygem-rack: Possible DoS Vulnerability with Range Header in Rack
- BZ - 2265595 - CVE-2024-26146 rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
- RHEL-7584 - Fix moving / banning clone and bundle resources
- RHEL-7668 - Warning about existing constraints in 'pcs status' should not display expired constraints
- RHEL-7729 - `pcs property describe` does not raise an error for non-existent properties
- RHEL-7731 - pcs does not prevent disabling ATB when it can break SBD
- RHEL-7732 - Improve error message when adding a new node to a cluster with sbd is not possible
- RHEL-7741 - pcs rebase bz for 8.10
- RHEL-7742 - Improve documentation and error messages of `pcs resource move` command
- RHEL-7743 - `pcs resource create` fails with a traceback if empty interval is specified for an operation
- RHEL-7745 - [RFE] Allow PCS to configure all qdevice options (without --force)
- RHEL-8467 - 'pcs booth ticket grant | revoke' fails with a confusing error message
- RHEL-17280 - Remove the preview of pcs-web-ui in RHEL 8
Red Hat Enterprise Linux High Availability for x86_64 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
x86_64 | |
pcs-0.10.18-2.el8_10.x86_64.rpm | SHA-256: fdfa615e4ce8774720b0b5af5707ed0cdc87733fe1a2f804f54e6f53a36f98e7 |
pcs-snmp-0.10.18-2.el8_10.x86_64.rpm | SHA-256: 5832b7426511ae041de33281103c73f9a30cfef3130681ed02714a200b459d67 |
Red Hat Enterprise Linux High Availability for ARM 64 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
aarch64 | |
pcs-0.10.18-2.el8_10.aarch64.rpm | SHA-256: 5fd2d365c93017dd5718f7e488d9e784deb1a3d3007df0d2a7993012bc5efc61 |
pcs-snmp-0.10.18-2.el8_10.aarch64.rpm | SHA-256: addc39904e87d54eed719946e61de0fc154711b98c4c747706a79f1ceec61ce5 |
Red Hat Enterprise Linux Resilient Storage for x86_64 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
x86_64 | |
pcs-0.10.18-2.el8_10.x86_64.rpm | SHA-256: fdfa615e4ce8774720b0b5af5707ed0cdc87733fe1a2f804f54e6f53a36f98e7 |
pcs-snmp-0.10.18-2.el8_10.x86_64.rpm | SHA-256: 5832b7426511ae041de33281103c73f9a30cfef3130681ed02714a200b459d67 |
Red Hat Enterprise Linux Resilient Storage for IBM z Systems 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
s390x | |
pcs-0.10.18-2.el8_10.s390x.rpm | SHA-256: 3195d41ae87d9bb8cde2e778a083093947b622984fe773f3cf5721895ea318e0 |
pcs-snmp-0.10.18-2.el8_10.s390x.rpm | SHA-256: 8bc7ee19980ff1226a25ca81bd9be7b7645e4ddbbeffa7c31387b771b926d0d1 |
Red Hat Enterprise Linux High Availability for IBM z Systems 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
s390x | |
pcs-0.10.18-2.el8_10.s390x.rpm | SHA-256: 3195d41ae87d9bb8cde2e778a083093947b622984fe773f3cf5721895ea318e0 |
pcs-snmp-0.10.18-2.el8_10.s390x.rpm | SHA-256: 8bc7ee19980ff1226a25ca81bd9be7b7645e4ddbbeffa7c31387b771b926d0d1 |
Red Hat Enterprise Linux Resilient Storage for Power, little endian 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
ppc64le | |
pcs-0.10.18-2.el8_10.ppc64le.rpm | SHA-256: bc22397538a4d23f0c72aabd814af2764d2296457a2465c5a869c347839a2fe1 |
pcs-snmp-0.10.18-2.el8_10.ppc64le.rpm | SHA-256: 46963a8430769226a6c9bc180d7341593cef624ec55eda66f337811c0977e90f |
Red Hat Enterprise Linux High Availability for Power, little endian 8
SRPM | |
---|---|
pcs-0.10.18-2.el8_10.src.rpm | SHA-256: ce1de996c3b72037d1eb26fc3e0d8a627b805d319d6173e03f20bbe4645c94b1 |
ppc64le | |
pcs-0.10.18-2.el8_10.ppc64le.rpm | SHA-256: bc22397538a4d23f0c72aabd814af2764d2296457a2465c5a869c347839a2fe1 |
pcs-snmp-0.10.18-2.el8_10.ppc64le.rpm | SHA-256: 46963a8430769226a6c9bc180d7341593cef624ec55eda66f337811c0977e90f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.