pcs-0.10.18-2.el8_10.8.ML.1

エラータID: AXSA:2026-089:01

Release date: 
Wednesday, January 28, 2026 - 11:53
Subject: 
pcs-0.10.18-2.el8_10.8.ML.1
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* tornado: Tornado Quadratic DoS via Repeated Header Coalescing (CVE-2025-67725)
* tornado: Tornado Quadratic DoS via Crafted Multipart Parameters (CVE-2025-67726)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-67725
Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server's event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS). Due to Python string immutability, each concatenation copies the entire string, resulting in O(n²) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.
CVE-2025-67726
Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n²)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. pcs-0.10.18-2.el8_10.8.ML.1.src.rpm
    MD5: c759cae385e92fe9c1aae9b9893be927
    SHA-256: 3fd7d90d70b954d68e6ca1fb4e082adeb591cfebb4462548c2e7db3377661680
    Size: 5.17 MB

Asianux Server 8 for x86_64
  1. pcs-0.10.18-2.el8_10.8.ML.1.x86_64.rpm
    MD5: 7cbb2e6b74d29ae32e2b88b83cce4f19
    SHA-256: 0ac463adbd4d404cda12caebdd5b42081b1381b5767c295498d3b12223d45a5e
    Size: 4.11 MB
  2. pcs-snmp-0.10.18-2.el8_10.8.ML.1.x86_64.rpm
    MD5: 81d0ea55e300ac7769298b221d154279
    SHA-256: bd9cb1c2dea53378a581129b827bb7196e3a6c940eb36762107f38711fde8c4c
    Size: 82.03 kB