First published: Wed Aug 12 2015(Updated: )
It was reported that pcs package is vulnerable to command injection with root privileges. A user supplied string is used to in running a system command. If the user uses escape characters they can run a command as the root user on the system. To do this the user must already have access to login to pcsd (Be a member of the hacluster group).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pacemaker/Corosync Configuration System | <=0.9.139 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-5190 is classified as high due to its potential for command injection with root privileges.
To fix CVE-2015-5190, update the pacemaker/corosync configuration system to version 0.9.140 or later.
CVE-2015-5190 affects the Pacemaker/Corosync Configuration System version 0.9.139 and earlier.
No, a user must have existing login access to the system to exploit CVE-2015-5190.
To mitigate CVE-2015-5190, restrict user access to the system and apply the software update as soon as possible.