Latest starwindsoftware starwind virtual san Vulnerabilities

Red Hat Polkit Out-of-Bounds Read and Write Vulnerability
redhat/polkit<0:0.96-11.el6_10.2
redhat/polkit<0:0.112-26.el7_9.1
redhat/polkit<0:0.112-12.el7_3.1
redhat/polkit<0:0.112-12.el7_4.2
redhat/polkit<0:0.112-18.el7_6.3
redhat/polkit<0:0.112-22.el7_7.2
and 62 more
A flaw was found in the way NSS verifies certificates. That will happen both when client reads the Certificate message from the server or when server is configured to ask for client certificates and t...
redhat/nss<0:3.44.0-12.el6_10
redhat/nss<0:3.67.0-4.el7_9
redhat/nss<0:3.28.4-2.el7_3
redhat/nss<0:3.28.4-18.el7_4
redhat/nss<0:3.36.0-10.2.el7_6
redhat/nss<0:3.44.0-8.el7_7
and 22 more
** DISPUTED ** An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used...
Unicode Unicode<14.0.0
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Fedoraproject Fedora=35
Starwindsoftware Starwind Virtual San=v8r13-14398
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs f...
debian/openssh<=1:7.9p1-10+deb10u2<=1:7.9p1-10<=1:8.4p1-5<=1:8.4p1-6
ubuntu/openssh<1:8.2
ubuntu/openssh<8.8
ubuntu/openssh<1:7.2
Openbsd Openssh>=6.2<8.8
Fedoraproject Fedora=33
and 21 more
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field...
MIT Kerberos 5<1.18.5
MIT Kerberos 5>=1.19.0<1.19.3
Fedoraproject Fedora=33
Debian Debian Linux=9.0
Starwindsoftware Starwind Virtual San=v8r13-14338
Oracle Communications Cloud Native Core Network Slice Selection Function=22.1.0
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_c...
redhat/kernel<0:2.6.32-754.43.1.el6
redhat/kernel-rt<0:3.10.0-1160.49.1.rt56.1189.el7
redhat/kernel<0:3.10.0-1160.49.1.el7
redhat/kernel<0:3.10.0-327.102.1.el7
redhat/kernel<0:3.10.0-514.95.1.el7
redhat/kernel<0:3.10.0-693.95.1.el7
and 150 more
A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the sy...
Linux Linux kernel<=5.14.13
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Fedoraproject Fedora=35
Debian Debian Linux=9.0
Mozilla NSS=v8r12
and 131 more
RPM could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the signature check function. By persuading a victim to open a specially-crafted package file, an attacke...
IBM Cloud Pak for Security (CP4S)<=1.7.2.0
IBM Cloud Pak for Security (CP4S)<=1.7.1.0
IBM Cloud Pak for Security (CP4S)<=1.7.0.0
Rpm Rpm>=4.15.0<4.15.1.3
Rpm Rpm>=4.16.0<4.16.1.3
Rpm Rpm=4.15.0-alpha
and 11 more
An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a s...
redhat/kernel-rt<0:3.10.0-1160.53.1.rt56.1193.el7
redhat/kernel<0:3.10.0-1160.53.1.el7
redhat/kernel<0:4.18.0-305.el8
redhat/kernel-rt<0:4.18.0-193.71.1.rt13.121.el8_2
redhat/kernel<0:4.18.0-193.71.1.el8_2
redhat/Linux kernel<5.11
and 120 more
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial...
redhat/kernel-rt<0:3.10.0-1160.53.1.rt56.1193.el7
redhat/kernel<0:3.10.0-1160.53.1.el7
redhat/kernel-rt<0:4.18.0-305.rt7.72.el8
redhat/kernel<0:4.18.0-305.el8
redhat/kernel-rt<0:4.18.0-193.60.2.rt13.112.el8_2
redhat/kernel<0:4.18.0-193.60.2.el8_2
and 121 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203