[RHSA-2021:4142] pcs security, bug fix, and enhancement update
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
The following packages have been upgraded to a later upstream version: pcs (0.10.10). (BZ#1935594)
Security Fix(es):
jquery: Cross-site scripting (XSS) via <script> HTML tags containing whitespaces (CVE-2020-7656)
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/pcs?arch=x86_64&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs?arch=s390x&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs?arch=ppc64le&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs?arch=aarch64&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs-snmp?arch=x86_64&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs-snmp?arch=s390x&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs-snmp?arch=ppc64le&distro=redhat-8 | < 0.10.10-4.el8 |
pkg:rpm/redhat/pcs-snmp?arch=aarch64&distro=redhat-8 | < 0.10.10-4.el8 |
- ID
- RHSA-2021:4142
- Severity
- low
- URL
- https://access.redhat.com/errata/RHSA-2021:4142
- Published
-
2021-11-09T00:00:00
(2 years ago) - Modified
-
2021-11-09T00:00:00
(2 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2020-1519
- ALAS2-2021-1626
- ALAS2-2023-1905
- ALPINE:CVE-2019-11358
- ALPINE:CVE-2020-11023
- ALSA-2020:4670
- ALSA-2020:4847
- ALSA-2021:1846
- ASA-201906-2
- DSA-4434-1
- DSA-4460-1
- DSA-4693-1
- ELSA-2020-3936
- ELSA-2021-0860
- ELSA-2021-1846
- ELSA-2021-9400
- ELSA-2021-9552
- ELSA-2022-7343
- ELSA-2022-9177
- FEDORA-2019-040857fd75
- FEDORA-2019-1a3edd7e8a
- FEDORA-2019-2a0ce0c58c
- FEDORA-2019-41d6ffd6f0
- FEDORA-2019-5f1a2cc839
- FEDORA-2019-7eaf0bbe7c
- FEDORA-2019-84a50e34a9
- FEDORA-2019-a06dffab1c
- FEDORA-2019-eba8e44ee6
- FEDORA-2019-f563e66380
- FEDORA-2020-0b32a59b54
- FEDORA-2020-36d2db5f51
- FEDORA-2020-7dddce530c
- FEDORA-2020-8a15713da2
- FEDORA-2020-fbb94073a1
- FEDORA-2020-fe94df8c34
- FREEBSD:3C5A4FE0-9EBB-11E9-9169-FCAA147E860E
- FREEBSD:CD2DC126-CFE4-11EA-9172-4C72B94353B5
- FREEBSD:FFC73E87-87F0-11E9-AD56-FCAA147E860E
- GLSA-202007-03
- MAVEN:GHSA-6C3J-C64M-QHGQ
- MAVEN:GHSA-JPCQ-CGW6-V4J6
- MAVEN:GHSA-Q4M3-2J7H-F7XW
- NPM:GHSA-6C3J-C64M-QHGQ
- NPM:GHSA-JPCQ-CGW6-V4J6
- NPM:GHSA-Q4M3-2J7H-F7XW
- openSUSE-SU-2019:1839-1
- openSUSE-SU-2019:1872-1
- openSUSE-SU-2020:1060-1
- openSUSE-SU-2020:1106-1
- openSUSE-SU-2020:1888-1
- RHSA-2020:3936
- RHSA-2020:4670
- RHSA-2020:4847
- RHSA-2021:0860
- RHSA-2021:1846
- RHSA-2022:7343
- RLSA-2020:4670
- RLSA-2020:4847
- RLSA-2021:1846
- RUBYSEC:JQUERY-RAILS-2019-11358
- RUBYSEC:JQUERY-RAILS-2020-11023
- RUBYSEC:JQUERY-RAILS-2020-7656
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1701972 | https://bugzilla.redhat.com/1701972 | |
Bugzilla | 1850004 | https://bugzilla.redhat.com/1850004 | |
Bugzilla | 1850119 | https://bugzilla.redhat.com/1850119 | |
RHSA | RHSA-2021:4142 | https://access.redhat.com/errata/RHSA-2021:4142 | |
CVE | CVE-2019-11358 | https://access.redhat.com/security/cve/CVE-2019-11358 | |
CVE | CVE-2020-11023 | https://access.redhat.com/security/cve/CVE-2020-11023 | |
CVE | CVE-2020-7656 | https://access.redhat.com/security/cve/CVE-2020-7656 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/pcs?arch=x86_64&distro=redhat-8 | redhat | pcs | < 0.10.10-4.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/pcs?arch=s390x&distro=redhat-8 | redhat | pcs | < 0.10.10-4.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/pcs?arch=ppc64le&distro=redhat-8 | redhat | pcs | < 0.10.10-4.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/pcs?arch=aarch64&distro=redhat-8 | redhat | pcs | < 0.10.10-4.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/pcs-snmp?arch=x86_64&distro=redhat-8 | redhat | pcs-snmp | < 0.10.10-4.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/pcs-snmp?arch=s390x&distro=redhat-8 | redhat | pcs-snmp | < 0.10.10-4.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/pcs-snmp?arch=ppc64le&distro=redhat-8 | redhat | pcs-snmp | < 0.10.10-4.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/pcs-snmp?arch=aarch64&distro=redhat-8 | redhat | pcs-snmp | < 0.10.10-4.el8 | redhat-8 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |