pcs is vulnerable to SSL cookie without secure flag. The vulnerability exists as the pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html
rhn.redhat.com/errata/RHSA-2015-0980.html
rhn.redhat.com/errata/RHSA-2015-0990.html
www.securityfocus.com/bid/74623
access.redhat.com/errata/RHSA-2015:0980
access.redhat.com/errata/RHSA-2015:0990
access.redhat.com/security/cve/CVE-2015-1848
access.redhat.com/security/cve/CVE-2015-3983
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/attachment.cgi?id=1009855
bugzilla.redhat.com/show_bug.cgi?id=1208294
rhn.redhat.com/errata/RHSA-2015-0990.html