Enterprise Linux High Availability Red Hat Enterprise Linux High Availability

Do you want an email whenever new security vulnerabilities are reported in Red Hat Enterprise Linux High Availability?

By the Year

In 2024 there have been 0 vulnerabilities in Red Hat Enterprise Linux High Availability . Last year Enterprise Linux High Availability had 1 security vulnerability published. Right now, Enterprise Linux High Availability is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 9.80
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Enterprise Linux High Availability vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Enterprise Linux High Availability Security Vulnerabilities

It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1

CVE-2023-2319 9.8 - Critical - May 17, 2023

It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.

Pacemaker before 1.1.13 does not properly evaluate added nodes, which

CVE-2015-1867 - August 12, 2015

Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.

Permissions, Privileges, and Access Controls

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session

CVE-2015-1848 - May 14, 2015

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

Cryptographic Issues

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Enterprise Linux Resilient Storage or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe