- Issued:
- 2025-11-05
- Updated:
- 2025-11-05
RHSA-2025:19800 - Security Advisory
Synopsis
Important: pcs security update
Type/Severity
Security Advisory: Important
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for pcs is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
- rubygem-rack: Rack QueryParser has an unsafe default allowing params_limit bypass via semicolon-separated parameters (CVE-2025-59830)
- rack: Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion) (CVE-2025-61770)
- rack: Rack's multipart parser buffers large non?file fields entirely in memory, enabling DoS (memory exhaustion) (CVE-2025-61771)
- rack: Rack memory exhaustion denial of service (CVE-2025-61772)
- rubygem-rack: Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion (CVE-2025-61919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux High Availability for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux High Availability for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux High Availability for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux High Availability for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux Resilient Storage for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux Resilient Storage for Power, little endian - 4 years of updates 9.0 ppc64le
- Red Hat Enterprise Linux Resilient Storage for IBM z Systems - 4 years of updates 9.0 s390x
Fixes
- BZ - 2398167 - CVE-2025-59830 rubygem-rack: Rack QueryParser has an unsafe default allowing params_limit bypass via semicolon-separated parameters
- BZ - 2402174 - CVE-2025-61770 rack: Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)
- BZ - 2402175 - CVE-2025-61771 rack: Rack's multipart parser buffers large non?file fields entirely in memory, enabling DoS (memory exhaustion)
- BZ - 2402200 - CVE-2025-61772 rack: Rack memory exhaustion denial of service
- BZ - 2403180 - CVE-2025-61919 rubygem-rack: Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion
Red Hat Enterprise Linux High Availability for Power LE - Update Services for SAP Solutions 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| ppc64le | |
| pcs-0.11.1-10.el9_0.9.ppc64le.rpm | SHA-256: 7c42056e9115367cac0fb9d65c76ce93699ee7b3ff9b00a4f17d22d71f0ff994 |
| pcs-snmp-0.11.1-10.el9_0.9.ppc64le.rpm | SHA-256: 5783d0672cd77929fee2c7e521122b6a24ae1756918bafac587ca8331a7a094d |
Red Hat Enterprise Linux High Availability for x86_64 - Update Services for SAP Solutions 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| x86_64 | |
| pcs-0.11.1-10.el9_0.9.x86_64.rpm | SHA-256: ff30862f4cc10644c830a368e29b4239c0a342fa0e162292f1dcae45ab855814 |
| pcs-snmp-0.11.1-10.el9_0.9.x86_64.rpm | SHA-256: dd13eb32e444c54946e673156cc31e20212750f8984f9beef407266530927ae8 |
Red Hat Enterprise Linux High Availability for ARM 64 - 4 years of updates 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| aarch64 | |
| pcs-0.11.1-10.el9_0.9.aarch64.rpm | SHA-256: bf40c49e75123515c4a4c3e302a6f4aba7c290ebf25702a9a19366ac4973c699 |
| pcs-snmp-0.11.1-10.el9_0.9.aarch64.rpm | SHA-256: 0c7c90d3964678dffb422635d8b51e3a2bd2983d100cdec15f268baa0244ebd1 |
Red Hat Enterprise Linux High Availability for IBM z Systems - 4 years of updates 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| s390x | |
| pcs-0.11.1-10.el9_0.9.s390x.rpm | SHA-256: 96f7ff0e467ffc472b1f416ccdcefd44aee09000b8b40e5041f2cf527ed02ea5 |
| pcs-snmp-0.11.1-10.el9_0.9.s390x.rpm | SHA-256: 8b228b083d33acbef4993e1e3440cd67a5c5a426d2c458a991ec630fd6bacf61 |
Red Hat Enterprise Linux Resilient Storage for x86_64 - 4 years of updates 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| x86_64 | |
| pcs-0.11.1-10.el9_0.9.x86_64.rpm | SHA-256: ff30862f4cc10644c830a368e29b4239c0a342fa0e162292f1dcae45ab855814 |
| pcs-snmp-0.11.1-10.el9_0.9.x86_64.rpm | SHA-256: dd13eb32e444c54946e673156cc31e20212750f8984f9beef407266530927ae8 |
Red Hat Enterprise Linux Resilient Storage for Power, little endian - 4 years of updates 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| ppc64le | |
| pcs-0.11.1-10.el9_0.9.ppc64le.rpm | SHA-256: 7c42056e9115367cac0fb9d65c76ce93699ee7b3ff9b00a4f17d22d71f0ff994 |
| pcs-snmp-0.11.1-10.el9_0.9.ppc64le.rpm | SHA-256: 5783d0672cd77929fee2c7e521122b6a24ae1756918bafac587ca8331a7a094d |
Red Hat Enterprise Linux Resilient Storage for IBM z Systems - 4 years of updates 9.0
| SRPM | |
|---|---|
| pcs-0.11.1-10.el9_0.9.src.rpm | SHA-256: ff69291a1b1053165ca5d444304d55166ddf22f917ee9332426d732cde51fa8c |
| s390x | |
| pcs-0.11.1-10.el9_0.9.s390x.rpm | SHA-256: 96f7ff0e467ffc472b1f416ccdcefd44aee09000b8b40e5041f2cf527ed02ea5 |
| pcs-snmp-0.11.1-10.el9_0.9.s390x.rpm | SHA-256: 8b228b083d33acbef4993e1e3440cd67a5c5a426d2c458a991ec630fd6bacf61 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.