The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of CentOS

RHEL 7: privilege escalation via Runc CVE-2016-9962 Regression
An attacker can bypass restrictions via Runc CVE-2016-9962 Regression of RHEL 7, in order to escalate his privileges...
CVE-2020-14300, RHBUG-1848829, RHSA-2020:2653-01, VIGILANCE-VUL-32609
Containers Image: denial of service via Manifest File
An attacker can trigger a fatal error via Manifest File of Containers Image, in order to trigger a denial of service...
CVE-2020-1702, RHBUG-1792796, RHSA-2020:1227-01, RHSA-2020:1234-01, RHSA-2020:1650-01, RHSA-2020:2681-01, VIGILANCE-VUL-32607
Intel Processors: information disclosure via Special Register Buffer Data Sampling
An attacker can bypass access restrictions to data via Special Register Buffer Data Sampling of Intel Processors, in order to obtain sensitive information...
CERTFR-2020-AVI-351, CERTFR-2020-AVI-352, CERTFR-2020-AVI-353, CERTFR-2020-AVI-356, CERTFR-2020-AVI-368, CERTFR-2020-AVI-376, CTX275165, CVE-2020-0543, DLA-2241-1, DLA-2241-2, DLA-2242-1, DLA-2248-1, DSA-4698-1, DSA-4699-1, DSA-4701-1, FEDORA-2020-11ddbfbdf0, FEDORA-2020-3364913ace, FEDORA-2020-e47d28bc2b, FEDORA-2020-e49a911382, FEDORA-2020-e8835a5f8e, HPESBHF04001, INTEL-SA-00320, openSUSE-SU-2020:0791-1, openSUSE-SU-2020:0801-1, openSUSE-SU-2020:0818-1, RHSA-2020:2431-01, RHSA-2020:2432-01, RHSA-2020:2433-01, RHSA-2020:2677-01, RHSA-2020:2679-01, RHSA-2020:2680-01, RHSA-2020:2706-01, RHSA-2020:2707-01, RHSA-2020:2757-01, RHSA-2020:2758-01, RHSA-2020:2771-01, RHSA-2020:2842-01, SSA:2020-163-01, SUSE-SU-2020:14393-1, SUSE-SU-2020:14394-1, SUSE-SU-2020:1599-1, SUSE-SU-2020:1630-1, SUSE-SU-2020:1632-1, SUSE-SU-2020:1633-1, SUSE-SU-2020:1634-1, SUSE-SU-2020:1663-1, USN-4385-1, USN-4385-2, USN-4387-1, USN-4388-1, USN-4389-1, USN-4390-1, USN-4391-1, USN-4392-1, USN-4393-1, VIGILANCE-VUL-32486, XSA-320
Linux kernel: use after free
An attacker can force the usage of a freed memory area of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2020-AVI-300, CERTFR-2020-AVI-307, CERTFR-2020-AVI-312, CERTFR-2020-AVI-326, CERTFR-2020-AVI-355, CERTFR-2020-AVI-376, CVE-2020-12657, openSUSE-SU-2020:0801-1, RHSA-2020:2427-01, RHSA-2020:2428-01, RHSA-2020:2429-01, RHSA-2020:2567-01, RHSA-2020:2667-01, RHSA-2020:2669-01, SUSE-SU-2020:1599-1, SUSE-SU-2020:1663-1, USN-4363-1, USN-4367-1, USN-4367-2, USN-4368-1, USN-4369-1, USN-4369-2, VIGILANCE-VUL-32296
Mozilla Firefox, Google Chrome: buffer overflow via SCTP
An attacker can trigger a buffer overflow via SCTP in Mozilla Firefox and Google Chrome, in order to trigger a denial of service, and possibly to run code...
ADV200002, CERTFR-2020-AVI-269, CVE-2020-6831, DLA-2205-1, DLA-2206-1, DSA-4678-1, DSA-4683-1, DSA-4714-1, DSA-4714-2, FEDORA-2020-3c52435c2d, FEDORA-2020-9e2c5c8f1e, FEDORA-2020-f389eab5d1, MFSA2020-16, MFSA2020-17, MFSA2020-18, openSUSE-SU-2020:0620-1, openSUSE-SU-2020:0621-1, openSUSE-SU-2020:0643-1, openSUSE-SU-2020:0648-1, openSUSE-SU-2020:0709-1, openSUSE-SU-2020:0917-1, RHSA-2020:2031-01, RHSA-2020:2032-01, RHSA-2020:2033-01, RHSA-2020:2036-01, RHSA-2020:2037-01, RHSA-2020:2046-01, RHSA-2020:2047-01, RHSA-2020:2048-01, RHSA-2020:2049-01, RHSA-2020:2050-01, RHSA-2020:2064-01, SSA:2020-126-01, SUSE-SU-2020:1209-1, SUSE-SU-2020:1218-1, SUSE-SU-2020:1225-1, SUSE-SU-2020:14359-1, USN-4353-1, USN-4353-2, USN-4373-1, VIGILANCE-VUL-32186
targetcli: privilege escalation via targetclid.sock
An attacker can bypass restrictions via targetclid.sock of targetcli, in order to escalate his privileges...
CVE-2020-10699, RHSA-2020:1933-01, VIGILANCE-VUL-32129
Linux kernel (on s390): privilege escalation
An attacker can bypass restrictions of the Linux kernel, in order to escalate his privileges...
CERTFR-2020-AVI-252, CERTFR-2020-AVI-281, CERTFR-2020-AVI-320, CERTFR-2020-AVI-355, CVE-2020-11884, DSA-4667-1, FEDORA-2020-16f9239805, FEDORA-2020-64d46a6e29, FEDORA-2020-b453269c4e, RHSA-2020:2102-01, RHSA-2020:2199-01, RHSA-2020:2429-01, USN-4342-1, USN-4343-1, USN-4345-1, VIGILANCE-VUL-32125
Ruby JSON: memory corruption
An attacker can trigger a memory corruption of Ruby JSON, in order to trigger a denial of service, and possibly to run code...
CVE-2020-10663, DLA-2190-1, DLA-2192-1, DSA-4721-1, FEDORA-2020-26df92331a, FEDORA-2020-a95706b117, FEDORA-2020-d171bf636d, openSUSE-SU-2020:0586-1, RHSA-2020:2462-01, RHSA-2020:2473-01, RHSA-2020:2670-01, SUSE-SU-2020:1570-1, VIGILANCE-VUL-32118
Squid cache: integer overflow via the HTTP Digest authentication
An attacker can trigger an integer overflow via the HTTP Digest authentication in Squid cache, in order to trigger a denial of service, and possibly to run code...
CERTFR-2020-AVI-239, CVE-2020-11945, DSA-4682-1, FEDORA-2020-56e809930e, FEDORA-2020-848065cc4c, FEDORA-2020-a6a921a591, openSUSE-SU-2020:0623-1, RHSA-2020:2038-01, RHSA-2020:2039-01, RHSA-2020:2040-01, RHSA-2020:2041-01, SQUID-2019:12, SQUID-2020:4, SUSE-SU-2020:1134-1, SUSE-SU-2020:1156-1, SUSE-SU-2020:1227-1, USN-4356-1, VIGILANCE-VUL-32088
Squid cache: buffer overflow via ESI
An attacker can trigger a buffer overflow via ESI of Squid cache, in order to trigger a denial of service, and possibly to run code...
CERTFR-2020-AVI-239, CVE-2019-12519, CVE-2019-12521, DSA-4682-1, openSUSE-SU-2020:0623-1, RHSA-2020:2038-01, RHSA-2020:2039-01, RHSA-2020:2040-01, RHSA-2020:2041-01, SQUID-2019:12, SQUID-2020:4, SUSE-SU-2020:1134-1, SUSE-SU-2020:1156-1, SUSE-SU-2020:1227-1, USN-4356-1, VIGILANCE-VUL-32087
Our database contains other pages. You can request a free trial to read them.

Display information about CentOS: