MiracleLinux 7 : pcs-0.9.143-15.el7 (AXSA:2015-718:02)

medium Nessus Plugin ID 289173

Synopsis

The remote MiracleLinux host is missing a security update.

Description

The remote MiracleLinux 7 host has a package installed that is affected by a vulnerability as referenced in the AXSA:2015-718:02 advisory.

pcs is a corosync and pacemaker configuration tool. It permits users to easily view, modify and created pacemaker based clusters.
Security issues fixed with this release:
CVE-2015-3225 lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
Enhancements:
* The pcs resource move and pcs resource ban commands now display a warning message to clarify the commands' behavior
* New command to move a Pacemaker resource to its preferred node Fixed bugs:
* Before this update, a bug caused location, ordering, and colocation constraints related to a resource group to be removed when removing any resource from that group. This bug has been fixed, and the constraints are now preserved until the group has no resources left, and is removed.
* Previously, when a user disabled a resource clone or multi-state resource, and then later enabled a primitive resource within it, the clone or multi-state resource remained disabled. With this update, enabling a resource within a disabled clone or multi-state resource enables it.
* When the web UI displayed a list of resource attributes, a bug caused the list to be truncated at the first = character. This update fixes the bug and now the web UI displays lists of resource attributes correctly.
* The documentation for the pcs stonith confirm command was not clear. This could lead to incorrect usage of the command, which could in turn cause data corruption. With this update, the documentation has been improved and the pcs stonith confirm command is now more clearly explained.
* Previously, if there were any unauthenticated nodes, creating a new cluster, adding a node to an existing cluster, or adding a cluster to the web UI failed with the message Node is not authenticated.
With this update, when the web UI detects a problem with authentication, the web UI displays a dialog to authenticate nodes as necessary.
* Previously, the web UI displayed only primitive resources. Thus there was no way to set attributes, constraints and other properties separately for a parent resource and a child resource. This has now been fixed, and resources are displayed in a tree structure, meaning all resource elements can be viewed and edited independently.
Enhancements:
* A dashboard has been added which shows the status of clusters in the web UI. Previously, it was not possible to view all important information about clusters in one place. Now, a dashboard showing the status of clusters has been added to the main page of the web UI.
* With this update, the pcsd daemon automatically synchronizes pcsd configuration across a cluster. This enables the web UI to be run from any node, allowing management even if any particular node is down.
* The web UI can now be used to set permissions for users and groups on a cluster. This allows users and groups to have their access restricted to certain operations on certain clusters.

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected pcs package.

See Also

https://tsn.miraclelinux.com/en/node/6104

Plugin Details

Severity: Medium

ID: 289173

File Name: miracle_linux_AXSA-2015-718.nasl

Version: 1.1

Type: local

Published: 1/16/2026

Updated: 1/16/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2015-3225

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:miracle:linux:7, p-cpe:/a:miracle:linux:pcs

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/24/2015

Vulnerability Publication Date: 6/16/2015

Reference Information

CVE: CVE-2015-3225