SCIENTIFIC-LINUX-ERRATA Archives

September 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 1 Sep 2015 17:20:18 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (34 lines)
Synopsis:          Important: pcs security update
Advisory ID:       SLSA-2015:1700-1
Issue Date:        2015-09-01
CVE Numbers:       CVE-2015-5189
                   CVE-2015-5190
--

A command injection flaw was found in the pcsd web UI. An attacker able to
trick a victim that was logged in to the pcsd web UI into visiting a
specially crafted URL could use this flaw to execute arbitrary code with
root privileges on the server hosting the web UI. (CVE-2015-5190)

A race condition was found in the way the pcsd web UI backend performed
authorization of user requests. An attacker could use this flaw to send a
request that would be evaluated as originating from a different user,
potentially allowing the attacker to perform actions with permissions of a
more privileged user. (CVE-2015-5189)
--

SL6
  x86_64
    pcs-0.9.139-9.el6_7.1.x86_64.rpm
    pcs-debuginfo-0.9.139-9.el6_7.1.x86_64.rpm
  i386
    pcs-0.9.139-9.el6_7.1.i686.rpm
    pcs-debuginfo-0.9.139-9.el6_7.1.i686.rpm
SL7
  x86_64
    pcs-0.9.137-13.el7_1.4.x86_64.rpm
    pcs-debuginfo-0.9.137-13.el7_1.4.x86_64.rpm
    python-clufter-0.9.137-13.el7_1.4.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2