[ALSA-2024:6311] Moderate: resource-agents security update
Type:
security
Severity:
moderate
Release date:
2024-09-05
Description:
The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment. Security Fix(es): * urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891) * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 resource-agents-4.9.0-54.el8_10.4.aarch64.rpm 915f45b4bf66ed762e5a3d96b0dc2154e1789a72d4ab9009efd9c14765fc5984
aarch64 resource-agents-paf-4.9.0-54.el8_10.4.aarch64.rpm a409a0e96d063081226e31b0d5211e05267c6775b97ca81aff683e2d9c5a678d
ppc64le resource-agents-4.9.0-54.el8_10.4.ppc64le.rpm 1c32528c2e70a229dc512107b9b6c8f53b90477154bdcceb1d88d6324972d2c1
ppc64le resource-agents-paf-4.9.0-54.el8_10.4.ppc64le.rpm 34a7ee7d7b1113a1fe69d52a68b9b90bde40968efdbe482ac094ca7fd48a1940
s390x resource-agents-4.9.0-54.el8_10.4.s390x.rpm 49968c46d225ff231eb9d118bc88fa52f68e463b87e54960c4dafcf849278e4d
s390x resource-agents-paf-4.9.0-54.el8_10.4.s390x.rpm 70184f5bbb27787d22c0ebf2b099169b56b1f712badb4ca877d700ee96cb1c14
x86_64 resource-agents-4.9.0-54.el8_10.4.x86_64.rpm 05d5ec4f428e08db525091893310125a063e503668ec7bc82369318bd5c4daa0
x86_64 resource-agents-aliyun-4.9.0-54.el8_10.4.x86_64.rpm 29655096b8525963863acf7fd39753c4875b0b666845d49812160f0e73df76c6
x86_64 resource-agents-paf-4.9.0-54.el8_10.4.x86_64.rpm 64b7cda763f34cf36eabafd2055129658bc5fe6791c89021b0fff6eb9346b44e
x86_64 resource-agents-gcp-4.9.0-54.el8_10.4.x86_64.rpm 815fce3f7ba6d68cf25542c9144b9ec95c9e27d0c1288cd3aa27782096633e69
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.