Headline
Red Hat Security Advisory 2023-1591-01
Red Hat Security Advisory 2023-1591-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: pcs security update
Advisory ID: RHSA-2023:1591-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1591
Issue date: 2023-04-04
CVE Names: CVE-2023-28154
=====================================================================
- Summary:
An update for pcs is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux High Availability (v. 9) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Resilient Storage (v. 9) - ppc64le, s390x, x86_64
- Description:
The pcs packages provide a command-line configuration system for the
Pacemaker and Corosync utilities.
Security Fix(es):
- webpack: avoid cross-realm objects (CVE-2023-28154)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
2179227 - CVE-2023-28154 webpack: avoid cross-realm objects
- Package List:
Red Hat Enterprise Linux High Availability (v. 9):
Source:
pcs-0.11.3-4.el9_1.3.src.rpm
aarch64:
pcs-0.11.3-4.el9_1.3.aarch64.rpm
pcs-snmp-0.11.3-4.el9_1.3.aarch64.rpm
ppc64le:
pcs-0.11.3-4.el9_1.3.ppc64le.rpm
pcs-snmp-0.11.3-4.el9_1.3.ppc64le.rpm
s390x:
pcs-0.11.3-4.el9_1.3.s390x.rpm
pcs-snmp-0.11.3-4.el9_1.3.s390x.rpm
x86_64:
pcs-0.11.3-4.el9_1.3.x86_64.rpm
pcs-snmp-0.11.3-4.el9_1.3.x86_64.rpm
Red Hat Enterprise Linux Resilient Storage (v. 9):
Source:
pcs-0.11.3-4.el9_1.3.src.rpm
ppc64le:
pcs-0.11.3-4.el9_1.3.ppc64le.rpm
pcs-snmp-0.11.3-4.el9_1.3.ppc64le.rpm
s390x:
pcs-0.11.3-4.el9_1.3.s390x.rpm
pcs-snmp-0.11.3-4.el9_1.3.s390x.rpm
x86_64:
pcs-0.11.3-4.el9_1.3.x86_64.rpm
pcs-snmp-0.11.3-4.el9_1.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2023-28154
https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBZCw/SNzjgjWX9erEAQgFiQ//cSTnnBTtcttxVs9yS2likrkJEbQMxdlk
9P2vJJyx30d2I09mgAN7QU/8VVntlBJwBzGPBVn8UcIqSS2jHNNP22eQ4/3qAQqI
pNDQoa+xvi8+M9sDWI4+/suFaLATvD5lZctbr7C4NgL2dMAnQh6vLdu7Noe61Z0/
Oevb3WbH6VI8Gq+Xn5EVmLjYQCsFqi6rsQFFBWwlhpbDp+e4P8FE7QzYKfWQ62Ro
u259cLje5O4L/iBVTsCNdC4i6ciTtelJvqQejfP22891EkuuKc52JteNk3olTZ9y
yVDvEJwu4PrTwb7oEJ341XwoVvsl6QmGxUAVl9BBmf85umJkVx5hpsKKwIfpevEZ
+ljH42KZMVzyTnW1vpxGd74PLa6TuOgiUHqf9jaVZ96xCUjY4z5ajfTqB0GJHG7K
jg9LVy4OCX3aOma+Nqiv20t2OCCJ3WmfQfzAtUn91tWVzobl6XTB5Diu4GKZBBqi
A2ROmiEtEVVafQ0XiiaisOLwYDzREXtKxjEHTTTTRejrNMi0TyeRcVN0Q/fNMTXm
9jBw6nXi5uig7Ag+xAnFzDh2J5tEflKHt/EQ4NYCavSGyml1tQUFvsaRiJUn68Nw
e+FI8SygXhZ6wdCSKB6REeTf92kaN8JtKmIeN65c/2Y5EG+jpc6R607H4zLbVP6o
jYuOvRPIXvQ=
=9+7P
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.
An update for pcs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2319: It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific...
An update for pcs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-28154: A flaw was found in the webpack package. Webpack could allow a remote attacker to bypass security restrictions caused by the mishandling of the magic comment feature by the ImportParserPlugin.js. An attacker can gain access to the real global object by sending a specially-crafted request.
Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object.
Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object.