- Issued:
- 2025-11-10
- Updated:
- 2025-11-10
RHSA-2025:19948 - Security Advisory
Synopsis
Important: pcs security update
Type/Severity
Security Advisory: Important
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for pcs is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
- rubygem-rack: Rack QueryParser has an unsafe default allowing params_limit bypass via semicolon-separated parameters (CVE-2025-59830)
- rack: Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion) (CVE-2025-61770)
- rack: Rack's multipart parser buffers large non?file fields entirely in memory, enabling DoS (memory exhaustion) (CVE-2025-61771)
- rack: Rack memory exhaustion denial of service (CVE-2025-61772)
- rubygem-rack: Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion (CVE-2025-61919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 - Advanced Update Support 8.4 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support Extension 8.4 x86_64
Fixes
- BZ - 2398167 - CVE-2025-59830 rubygem-rack: Rack QueryParser has an unsafe default allowing params_limit bypass via semicolon-separated parameters
- BZ - 2402174 - CVE-2025-61770 rack: Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)
- BZ - 2402175 - CVE-2025-61771 rack: Rack's multipart parser buffers large non?file fields entirely in memory, enabling DoS (memory exhaustion)
- BZ - 2402200 - CVE-2025-61772 rack: Rack memory exhaustion denial of service
- BZ - 2403180 - CVE-2025-61919 rubygem-rack: Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion
Red Hat Enterprise Linux High Availability for x86_64 - Advanced Update Support 8.4
| SRPM | |
|---|---|
| pcs-0.10.8-1.el8_4.8.src.rpm | SHA-256: e29815acf0b345b65148153c8001e7513b8f234df7f46c16a390b2465fc92f03 |
| x86_64 | |
| pcs-0.10.8-1.el8_4.8.x86_64.rpm | SHA-256: c9ae3dc40ad68a01e15be39aa71b964034aa2117e079dd00d139e2754681b678 |
| pcs-snmp-0.10.8-1.el8_4.8.x86_64.rpm | SHA-256: 68c21eed47033103b7726e26a536a1335c47ea2f3f24c2a0e99b9d4fa1cbc2c0 |
Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support Extension 8.4
| SRPM | |
|---|---|
| pcs-0.10.8-1.el8_4.8.src.rpm | SHA-256: e29815acf0b345b65148153c8001e7513b8f234df7f46c16a390b2465fc92f03 |
| x86_64 | |
| pcs-0.10.8-1.el8_4.8.x86_64.rpm | SHA-256: c9ae3dc40ad68a01e15be39aa71b964034aa2117e079dd00d139e2754681b678 |
| pcs-snmp-0.10.8-1.el8_4.8.x86_64.rpm | SHA-256: 68c21eed47033103b7726e26a536a1335c47ea2f3f24c2a0e99b9d4fa1cbc2c0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.