Red Hat Assisted Installer
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Assisted Installer.
Recent Red Hat Assisted Installer Security Advisories
| Advisory | Title | Published |
|---|---|---|
| RHSA-2026:1067 | (RHSA-2026:1067) Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.1 | January 23, 2026 |
| RHSA-2026:0671 | (RHSA-2026:0671) Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.8.4 | January 15, 2026 |
| RHSA-2025:19381 | (RHSA-2025:19381) Assisted Installer RHEL 8 components for Multicluster Engine for Kubernetes 2.9.1 | October 30, 2025 |
| RHSA-2025:19380 | (RHSA-2025:19380) Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.9.1 | October 30, 2025 |
By the Year
In 2026 there have been 1 vulnerability in Red Hat Assisted Installer with an average score of 7.5 out of ten. Assisted Installer did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 7.50 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 8.30 |
It may take a day or so for new Assisted Installer vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Assisted Installer Security Vulnerabilities
Negative DataRow Length in pgproto3 Leading to DoS
CVE-2026-4427
7.5 - High
- March 19, 2026
A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds out of range panic.
out-of-bounds array index
Authenticated Registry Access Path Traversal in containers/image
CVE-2024-3727
8.3 - High
- May 14, 2024
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
Improper Validation of Integrity Check Value
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Assisted Installer or by Red Hat? Click the Watch button to subscribe.