SCIENTIFIC-LINUX-ERRATA Archives

November 2022

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain; charset="utf-8"
Date:
Thu, 3 Nov 2022 13:31:54 -0000
Reply-To:
Subject:
MIME-Version:
1.0
Message-ID:
<20221103133154.7300.608@0acbe050e934>
Content-Transfer-Encoding:
7bit
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
From:
Farhan Ahmed <[log in to unmask]>
Parts/Attachments:
text/plain (27 lines)
Synopsis:          Important: pcs security update
Advisory ID:       SLSA-2022:7343-1
Issue Date:        2022-11-03
CVE Numbers:       CVE-2019-11358
                   CVE-2022-30123
--

Security Fix(es):

* rubygem-rack: crafted requests can cause shell escape sequences
(CVE-2022-30123)

* jquery: Prototype pollution in object's prototype leading to denial of
service, remote code execution, or property injection (CVE-2019-11358)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

SL7
  x86_64
    pcs-0.9.169-3.el7_9.3.x86_64.rpm
    pcs-debuginfo-0.9.169-3.el7_9.3.x86_64.rpm
    pcs-snmp-0.9.169-3.el7_9.3.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2