Synopsis: Important: piranha security and bug fix update Advisory ID: SLSA-2014:0175-1 Issue Date: 2014-02-13 CVE Numbers: CVE-2013-6492 -- It was discovered that the Piranha Configuration Tool did not properly restrict access to its web pages. A remote attacker able to connect to the Piranha Configuration Tool web server port could use this flaw to read or modify the LVS configuration without providing valid administrative credentials. (CVE-2013-6492) This update also fixes the following bug: * When the lvsd service attempted to start, the sem_timedwait() function received the interrupted function call (EINTR) error and exited, causing the lvsd service to fail to start. With this update, EINTR errors are correctly ignored during the start-up of the lvsd service. -- SL6 x86_64 piranha-0.8.6-4.el6_5.2.x86_64.rpm piranha-debuginfo-0.8.6-4.el6_5.2.x86_64.rpm i386 piranha-0.8.6-4.el6_5.2.i686.rpm piranha-debuginfo-0.8.6-4.el6_5.2.i686.rpm - Scientific Linux Development Team