Synopsis:          Important: piranha security and bug fix update
Advisory ID:       SLSA-2014:0175-1
Issue Date:        2014-02-13
CVE Numbers:       CVE-2013-6492
--

It was discovered that the Piranha Configuration Tool did not properly
restrict access to its web pages. A remote attacker able to connect to the
Piranha Configuration Tool web server port could use this flaw to read or
modify the LVS configuration without providing valid administrative
credentials. (CVE-2013-6492)

This update also fixes the following bug:

* When the lvsd service attempted to start, the sem_timedwait() function
received the interrupted function call (EINTR) error and exited, causing
the lvsd service to fail to start. With this update, EINTR errors are
correctly ignored during the start-up of the lvsd service.
--

SL6
  x86_64
    piranha-0.8.6-4.el6_5.2.x86_64.rpm
    piranha-debuginfo-0.8.6-4.el6_5.2.x86_64.rpm
  i386
    piranha-0.8.6-4.el6_5.2.i686.rpm
    piranha-debuginfo-0.8.6-4.el6_5.2.i686.rpm

- Scientific Linux Development Team