Revision Date: | 2015-09-01 | Version: | 636 |
Title: | RHSA-2015:1700: pcs security update (Important) |
Description: | The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
A command injection flaw was found in the pcsd web UI. An attacker able to trick a victim that was logged in to the pcsd web UI into visiting a specially crafted URL could use this flaw to execute arbitrary code with root privileges on the server hosting the web UI. (CVE-2015-5190)
A race condition was found in the way the pcsd web UI backend performed authorization of user requests. An attacker could use this flaw to send a request that would be evaluated as originating from a different user, potentially allowing the attacker to perform actions with permissions of a more privileged user. (CVE-2015-5189)
These issues were discovered by Tomáš Jelínek of Red Hat.
All pcs users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. |
Family: | unix | Class: | patch |
Status: | | Reference(s): | CVE-2015-5189 CVE-2015-5190 RHSA-2015:1700 RHSA-2015:1700-00 RHSA-2015:1700-01 RHSA-2015:1700-02
|
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7
| Product(s): | |
Definition Synopsis |
Red Hat Enterprise Linux must be installed OR Package Information
Red Hat Enterprise Linux 6 is installed
AND pcs is earlier than 0:0.9.139-9.el6_7.1
AND pcs is signed with Red Hat redhatrelease2 key
OR Package Information
Red Hat Enterprise Linux 7 is installed
AND
pcs is earlier than 0:0.9.137-13.el7_1.4
AND pcs is signed with Red Hat redhatrelease2 key
python-clufter is earlier than 0:0.9.137-13.el7_1.4
AND python-clufter is signed with Red Hat redhatrelease2 key
|