This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A flaw was found in the way pacemaker, a cluster resource manager,
evaluated added nodes in certain situations. A user with read-only
access could potentially assign any other existing roles to themselves
and then add privileges to other users as well. (CVE-2015-1867)
This update also fixes the following bugs :
- Due to a race condition, nodes that gracefully shut down
occasionally had difficulty rejoining the cluster. As a
consequence, nodes could come online and be shut down
again immediately by the cluster. This bug has been
fixed, and the 'shutdown' attribute is now cleared
- Prior to this update, the pacemaker utility caused an
unexpected termination of the attrd daemon after a
system update to Scientific Linux 6.6. The bug has been
fixed so that attrd no longer crashes when pacemaker
- Previously, the access control list (ACL) of the
pacemaker utility allowed a role assignment to the
Cluster Information Base (CIB) with a read-only
permission. With this update, ACL is enforced and can no
longer be bypassed by the user without the write
permission, thus fixing this bug.
- Prior to this update, the ClusterMon (crm_mon) utility
did not trigger an external agent script with the '-E'
parameter to monitor the Cluster Information Base (CIB)
when the pacemaker utility was used. A patch has been
provided to fix this bug, and crm_mon now calls the
agent script when the '-E' parameter is used.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5