Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Enterprise_linux_high_availability_eus
(Redhat)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2015-05-14 | CVE-2015-1848 | The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag. | Pacemaker_configuration_system, Enterprise_linux_high_availability, Enterprise_linux_high_availability_eus, Enterprise_linux_resilient_storage, Enterprise_linux_resilient_storage_eus | N/A | ||
2023-05-17 | CVE-2023-2319 | It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2. | Pcs, Enterprise_linux_high_availability, Enterprise_linux_high_availability_eus | 9.8 |