First published: Thu May 14 2015(Updated: )
The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora Pacemaker Configuration System | <=0.9.137 | |
Redhat Enterprise Linux High Availability | =6.0 | |
Redhat Enterprise Linux High Availability | =7.0 | |
Redhat Enterprise Linux High Availability Eus | =6.6.z | |
Redhat Enterprise Linux High Availability Eus | =7.1 | |
Redhat Enterprise Linux Resilient Storage | =6.0 | |
Redhat Enterprise Linux Resilient Storage | =7.0 | |
Redhat Enterprise Linux Resilient Storage Eus | =6.6.z | |
Redhat Enterprise Linux Resilient Storage Eus | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.