First published: Mon Sep 16 2024(Updated: )
Moderate: pcs security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcs | <0.10.18-2.el8_10.2 | 0.10.18-2.el8_10.2 |
redhat/pcs | <0.10.18-2.el8_10.2 | 0.10.18-2.el8_10.2 |
redhat/pcs-snmp | <0.10.18-2.el8_10.2 | 0.10.18-2.el8_10.2 |
redhat/pcs | <0.10.18-2.el8_10.2.aa | 0.10.18-2.el8_10.2.aa |
redhat/pcs-snmp | <0.10.18-2.el8_10.2.aa | 0.10.18-2.el8_10.2.aa |
redhat/pcs-snmp | <0.10.18-2.el8_10.2 | 0.10.18-2.el8_10.2 |
redhat/pcs | <0.10.18-2.el8_10.2 | 0.10.18-2.el8_10.2 |
redhat/pcs-snmp | <0.10.18-2.el8_10.2 | 0.10.18-2.el8_10.2 |
Red Hat Enterprise Linux High Availability | ||
Red Hat Enterprise Linux High Availability | ||
Red Hat Enterprise Linux High Availability | ||
Red Hat Enterprise Linux High Availability | ||
Red Hat Enterprise Linux Resilient Storage | ||
Red Hat Red Hat Enterprise Linux Resilient Storage for Power, little endian | ||
Red Hat Enterprise Linux Resilient Storage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:6670 is classified as moderate.
To fix RHSA-2024:6670, update the pcs package to version 0.10.18-2.el8_10.2 or later.
RHSA-2024:6670 affects multiple versions of Red Hat Enterprise Linux High Availability and Resilient Storage for various architectures.
The primary issue addressed in RHSA-2024:6670 involves a Denial of Service vulnerability when parsing specific XML characters.
Yes, the pcs and pcs-snmp packages need to be updated to their specified versions in RHSA-2024:6670.