Red Hat Security Advisory 2015-0980-01 - The pcs packages provide a command-line tool and a web UI to configure and manage the Pacemaker and Corosync tools. It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI. This issue was discovered by Tomas Jelinek of Red Hat.
03c03420fbe5e45cc8de5f1fbab13998201b00a936d8729f3af3e2a6df91c0a0
Red Hat Security Advisory 2015-0990-01 - The pcs packages provide a command-line tool and a web UI to configure and manage the Pacemaker and Corosync tools. It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI. Note: the pcsd web UI is not enabled by default. This issue was discovered by Tomas Jelinek of Red Hat.
0b625bf3b3ec3b8e6a18100d5d2622d909085f86341392d3149d6b1c4bc0b248