Product:

Enterprise_linux_high_availability

(Redhat)
Repositories https://github.com/ClusterLabs/pacemaker
#Vulnerabilities 4
Date Id Summary Products Score Patch Annotated
2015-05-14 CVE-2015-1848 The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag. Pacemaker_configuration_system, Enterprise_linux_high_availability, Enterprise_linux_high_availability_eus, Enterprise_linux_resilient_storage, Enterprise_linux_resilient_storage_eus N/A
2023-05-17 CVE-2023-2319 It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2. Pcs, Enterprise_linux_high_availability, Enterprise_linux_high_availability_eus 9.8
2015-08-12 CVE-2015-1867 Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command. Pacemaker, Enterprise_linux_high_availability, Enterprise_linux_resilient_storage N/A
2017-03-24 CVE-2016-7797 Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection. Pacemaker, Leap, Leap, Enterprise_linux_high_availability, Enterprise_linux_resilient_storage, Linux_enterprise_high_availability, Linux_enterprise_software_development_kit 7.5