First published: Tue Nov 09 2021(Updated: )
The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.<br>The following packages have been upgraded to a later upstream version: pcs (0.10.10). (BZ#1935594)<br>Security Fix(es):<br><li> jquery: Cross-site scripting (XSS) via <script> HTML tags containing whitespaces (CVE-2020-7656)</li> <li> jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcs | <0.10.10-4.el8 | 0.10.10-4.el8 |
redhat/pcs | <0.10.10-4.el8 | 0.10.10-4.el8 |
redhat/pcs-snmp | <0.10.10-4.el8 | 0.10.10-4.el8 |
redhat/pcs-snmp | <0.10.10-4.el8 | 0.10.10-4.el8 |
redhat/pcs | <0.10.10-4.el8 | 0.10.10-4.el8 |
redhat/pcs-snmp | <0.10.10-4.el8 | 0.10.10-4.el8 |
redhat/pcs | <0.10.10-4.el8.aa | 0.10.10-4.el8.aa |
redhat/pcs-snmp | <0.10.10-4.el8.aa | 0.10.10-4.el8.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:4142 is categorized as moderate due to the potential for cross-site scripting vulnerabilities.
To fix RHSA-2021:4142, upgrade the pcs and pcs-snmp packages to version 0.10.10-4.el8 or later.
RHSA-2021:4142 affects the pcs and pcs-snmp packages, specifically versions prior to 0.10.10-4.el8.
RHSA-2021:4142 addresses a cross-site scripting (XSS) vulnerability in the jquery library.
Yes, it is recommended to apply the updates for RHSA-2021:4142 as soon as possible to mitigate security risks.