{"id":"USN-7614-1","summary":"pcs vulnerabilities","details":"Cedric Buissart discovered that pcs did not correctly handle certain\nparameters. An attacker could possibly use this issue to leak sensitive\ninformation or elevate their privileges. This issue only affected\nUbuntu 16.04 LTS. (CVE-2018-1086)\n\nOndrej Mular discovered that pcs did not correctly handle Unix socket\npermissions. An attacker could possibly use this issue to elevate their\nprivileges. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-2735)\n\nIt was discovered that pcs did not correctly handle PAM authentication.\nAn attacker could possibly use this issue to bypass authentication\nmechanisms. This issue only affected Ubuntu 20.04 LTS and \nUbuntu 22.04 LTS. (CVE-2022-1049)\n\nIt was discovered that pcs did not correctly handle the validation of\nNode names. An attacker could possibly use this issue to execute a\ncross-site scripting (XSS) attack. This issue only affected\nUbuntu 16.04 LTS. (CVE-2017-2661)","modified":"2026-02-10T04:49:33Z","published":"2025-07-02T08:20:20Z","related":["UBUNTU-CVE-2017-2661","UBUNTU-CVE-2018-1086","UBUNTU-CVE-2022-1049","UBUNTU-CVE-2022-2735"],"upstream":["CVE-2017-2661","CVE-2018-1086","CVE-2022-1049","CVE-2022-2735","UBUNTU-CVE-2017-2661","UBUNTU-CVE-2018-1086","UBUNTU-CVE-2022-1049","UBUNTU-CVE-2022-2735"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7614-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2661"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1086"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1049"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2735"}],"affected":[{"package":{"name":"pcs","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/pcs@0.9.149-1ubuntu1.1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.149-1ubuntu1.1+esm1"}]}],"versions":["0.9.149-1","0.9.149-1ubuntu1","0.9.149-1ubuntu1.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"0.9.149-1ubuntu1.1+esm1","binary_name":"pcs"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7614-1.json","cves_map":{"cves":[{"id":"CVE-2017-2661","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-1086","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-2735","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"pcs","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/pcs@0.10.4-3ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.10.4-3ubuntu0.1~esm1"}]}],"versions":["0.10.2-1","0.10.4-2","0.10.4-2ubuntu1","0.10.4-3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"0.10.4-3ubuntu0.1~esm1","binary_name":"pcs"},{"binary_version":"0.10.4-3ubuntu0.1~esm1","binary_name":"pcs-snmp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7614-1.json","cves_map":{"cves":[{"id":"CVE-2022-1049","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}},{"package":{"name":"pcs","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/pcs@0.10.11-2ubuntu3+esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.10.11-2ubuntu3+esm1"}]}],"versions":["0.10.8-1ubuntu1","0.10.11-2ubuntu2","0.10.11-2ubuntu3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"0.10.11-2ubuntu3+esm1","binary_name":"pcs"},{"binary_version":"0.10.11-2ubuntu3+esm1","binary_name":"pcs-snmp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7614-1.json","cves_map":{"cves":[{"id":"CVE-2022-1049","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-2735","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:22.04:LTS"}}}],"schema_version":"1.7.3"}