Latest redhat enterprise linux aus Vulnerabilities

Insights-client: unsafe handling of temporary files and directories
redhat/insights-client<3.2.2
Redhat Insights-client<3.2.2
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
Redhat Enterprise Linux Aus=8.6
and 46 more
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write i...
redhat/xorg-server<21.1.7
X.Org X Server<21.1.7
Fedoraproject Fedora=36
Fedoraproject Fedora=37
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=8.1
and 30 more
A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of th...
Samba Samba<4.15.0
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Redhat Virtualization Host=4.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux Aus=8.6
and 6 more
A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
redhat/kernel-rt<0:4.18.0-372.9.1.rt7.166.el8
redhat/kernel<0:4.18.0-372.9.1.el8
Linux Linux kernel
IBM Spectrum Copy Data Management>=2.2.0.0<=2.2.15.0
IBM Spectrum Protect Plus>=10.1.0<=10.1.10.2
Linux Linux kernel
and 161 more
A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or poten...
debian/linuxptp
Linuxptp Project Linuxptp<1.5.1
Linuxptp Project Linuxptp>=1.6.0<1.6.1
Linuxptp Project Linuxptp>=1.8.0<1.8.1
Linuxptp Project Linuxptp>=1.9.0<1.9.3
Linuxptp Project Linuxptp>=2.0.0<2.0.1
and 14 more
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This ...
Linux Linux kernel>=2.6.25<4.4.276
Linux Linux kernel>=4.5<4.9.276
Linux Linux kernel>=4.10<4.14.240
Linux Linux kernel>=4.15<4.19.198
Linux Linux kernel>=4.20<5.4.132
Linux Linux kernel>=5.5.0<5.10.50
and 241 more
Microsoft ASP.NET Core Security Feature Bypass Vulnerability
nuget/Microsoft.AspNetCore.Http<2.1.22
nuget/Microsoft.AspNetCore.App.Runtime.win-arm64>=3.1.5<3.1.8
nuget/Microsoft.AspNetCore.App.Runtime.win-x86>=3.1.0<3.1.8
nuget/Microsoft.AspNetCore.App.Runtime.win-x64>=3.1.0<3.1.8
nuget/Microsoft.AspNetCore.App.Runtime.win-arm>=3.1.0<3.1.8
nuget/Microsoft.AspNetCore.App.Runtime.osx-x64>=3.1.0<3.1.8
and 35 more
A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through th...
GNOME Control Center
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux Aus=8.2
Redhat Enterprise Linux Eus=8.2
Redhat Enterprise Linux Tus=8.2
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affec...
debian/spice<=0.14.0-1.3<=0.14.3-1
Spice Project Spice<0.14.2
Redhat Openstack=16.1
Canonical Ubuntu Linux=14.04
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
and 25 more
A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category...
redhat/kernel<0:2.6.32-754.29.2.el6
redhat/kernel-rt<0:3.10.0-1127.8.2.rt56.1103.el7
redhat/kernel<0:3.10.0-1127.8.2.el7
redhat/kernel-alt<0:4.14.0-115.21.2.el7a
redhat/kernel<0:3.10.0-327.88.1.el7
redhat/kernel<0:3.10.0-514.76.1.el7
and 115 more
A flaw was discovered in the Bluetooth protocol. An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.
redhat/kernel-rt<0:3.10.0-1062.4.1.rt56.1027.el7
redhat/kernel<0:3.10.0-1062.4.1.el7
redhat/kernel-alt<0:4.14.0-115.14.1.el7a
redhat/kernel<0:3.10.0-327.86.1.el7
redhat/kernel<0:3.10.0-514.70.1.el7
redhat/kernel<0:3.10.0-693.60.1.el7
and 729 more
An excessive resource consumption flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux ke...
redhat/kernel<0:2.6.32-754.15.3.el6
redhat/kernel<0:2.6.32-431.95.3.el6
redhat/kernel<0:2.6.32-504.79.3.el6
redhat/kernel-rt<0:3.10.0-957.21.3.rt56.935.el7
redhat/kernel<0:3.10.0-957.21.3.el7
redhat/kernel-alt<0:4.14.0-115.8.2.el7a
and 103 more
An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket ...
redhat/kernel<0:2.6.32-754.15.3.el6
redhat/kernel<0:2.6.32-431.95.3.el6
redhat/kernel<0:2.6.32-504.79.3.el6
redhat/kernel-rt<0:3.10.0-957.21.3.rt56.935.el7
redhat/kernel<0:3.10.0-957.21.3.el7
redhat/kernel-alt<0:4.14.0-115.8.2.el7a
and 104 more
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly othe...
redhat/kernel-rt<0:3.10.0-1062.4.1.rt56.1027.el7
redhat/kernel<0:3.10.0-1062.4.1.el7
redhat/kernel-alt<0:4.14.0-115.17.1.el7a
redhat/kernel<0:3.10.0-957.54.1.el7
redhat/kernel-rt<0:4.18.0-147.rt24.93.el8
redhat/kernel<0:4.18.0-147.el8
and 120 more
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_s...
Linux Linux kernel>=4.18<4.19.31
Linux Linux kernel>=4.20<5.0.4
openSUSE Leap=15.1
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux Aus=7.6
Redhat Enterprise Linux Desktop=7.0
and 13 more
A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead to DoS
redhat/pacemaker<2.0.2
ubuntu/pacemaker<1.1.18-0ubuntu1.1
ubuntu/pacemaker<1.1.18-2ubuntu1.18.10.1
ubuntu/pacemaker<1.1.18-2ubuntu1.19.04.1
ubuntu/pacemaker<1.1.14-2ubuntu1.6
Clusterlabs Pacemaker<=2.0.1
and 44 more
A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote...
Fedoraproject 389 Directory Server<1.3.8.4
Redhat Enterprise Linux Aus=7.6
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Server Eus=7.5
Redhat Enterprise Linux Server Eus=7.6
and 2 more
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain...
redhat/kernel<0:2.6.32-754.12.1.el6
redhat/kernel<0:2.6.32-504.80.2.el6
redhat/kernel-rt<0:3.10.0-957.rt56.910.el7
redhat/kernel-alt<0:4.14.0-115.el7a
redhat/kernel<0:3.10.0-957.el7
redhat/kernel<0:3.10.0-327.83.1.el7
and 142 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203