Scientific Linux Security Update : pacemaker on SL6.x i386/x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A flaw was found in the way pacemaker, a cluster resource manager,
evaluated added nodes in certain situations. A user with read-only
access could potentially assign any other existing roles to themselves
and then add privileges to other users as well. (CVE-2015-1867)

This update also fixes the following bugs :

- Due to a race condition, nodes that gracefully shut down
occasionally had difficulty rejoining the cluster. As a
consequence, nodes could come online and be shut down
again immediately by the cluster. This bug has been
fixed, and the 'shutdown' attribute is now cleared

- Prior to this update, the pacemaker utility caused an
unexpected termination of the attrd daemon after a
system update to Scientific Linux 6.6. The bug has been
fixed so that attrd no longer crashes when pacemaker

- Previously, the access control list (ACL) of the
pacemaker utility allowed a role assignment to the
Cluster Information Base (CIB) with a read-only
permission. With this update, ACL is enforced and can no
longer be bypassed by the user without the write
permission, thus fixing this bug.

- Prior to this update, the ClusterMon (crm_mon) utility
did not trigger an external agent script with the '-E'
parameter to monitor the Cluster Information Base (CIB)
when the pacemaker utility was used. A patch has been
provided to fix this bug, and crm_mon now calls the
agent script when the '-E' parameter is used.

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 85204 ()

Bugtraq ID:

CVE ID: CVE-2015-1867

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now