The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of CentOS

Intel Processors: information disclosure
An attacker can bypass access restrictions to data of Intel Processors, in order to obtain sensitive information...
CERTFR-2020-AVI-734, CERTFR-2020-AVI-741, CERTFR-2020-AVI-746, CTX285937, CVE-2020-8696, CVE-2020-8698, FEDORA-2020-14fda1bf85, FEDORA-2020-2c8824c6b1, FEDORA-2020-d5941ea479, HPESBHF04057, INTEL-SA-00381, openSUSE-SU-2020:1915-1, openSUSE-SU-2020:1923-1, openSUSE-SU-2020:2075-1, RHSA-2020:5083-01, RHSA-2020:5084-01, RHSA-2020:5085-01, RHSA-2020:5181-01, RHSA-2020:5182-01, RHSA-2020:5183-01, RHSA-2020:5184-01, RHSA-2020:5185-01, RHSA-2020:5186-01, RHSA-2020:5188-01, RHSA-2020:5189-01, RHSA-2020:5190-01, SUSE-SU-2020:14540-1, SUSE-SU-2020:14546-1, SUSE-SU-2020:3271-1, SUSE-SU-2020:3274-1, SUSE-SU-2020:3275-1, SUSE-SU-2020:3276-1, SUSE-SU-2020:3279-1, SUSE-SU-2020:3372-1, SUSE-SU-2020:3373-1, SUSE-SU-2020:3374-1, SUSE-SU-2020:3457-1, SUSE-SU-2020:3514-1, USN-4628-1, USN-4628-2, VIGILANCE-VUL-33881
Intel Processors: information disclosure via Running Average Power Limit
An attacker can bypass access restrictions to data via Running Average Power Limit of Intel Processors, in order to obtain sensitive information...
CERTFR-2020-AVI-728, CERTFR-2020-AVI-734, CERTFR-2020-AVI-741, CERTFR-2020-AVI-743, CERTFR-2020-AVI-750, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CERTFR-2020-AVI-776, CVE-2020-8694, CVE-2020-8695, FEDORA-2020-14fda1bf85, FEDORA-2020-2c8824c6b1, FEDORA-2020-d5941ea479, HPESBHF04059, INTEL-SA-00389, openSUSE-SU-2020:1906-1, openSUSE-SU-2020:1915-1, openSUSE-SU-2020:1923-1, openSUSE-SU-2020:2075-1, PLATYPUS, RHSA-2020:5083-01, RHSA-2020:5085-01, RHSA-2020:5181-01, RHSA-2020:5182-01, RHSA-2020:5183-01, RHSA-2020:5184-01, RHSA-2020:5185-01, RHSA-2020:5186-01, RHSA-2020:5188-01, RHSA-2020:5189-01, RHSA-2020:5190-01, SUSE-SU-2020:14540-1, SUSE-SU-2020:14546-1, SUSE-SU-2020:3271-1, SUSE-SU-2020:3272-1, SUSE-SU-2020:3273-1, SUSE-SU-2020:3274-1, SUSE-SU-2020:3275-1, SUSE-SU-2020:3276-1, SUSE-SU-2020:3279-1, SUSE-SU-2020:3326-1, SUSE-SU-2020:3372-1, SUSE-SU-2020:3373-1, SUSE-SU-2020:3374-1, SUSE-SU-2020:3457-1, SUSE-SU-2020:3484-1, SUSE-SU-2020:3501-1, SUSE-SU-2020:3503-1, SUSE-SU-2020:3512-1, SUSE-SU-2020:3513-1, SUSE-SU-2020:3514-1, SUSE-SU-2020:3522-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, USN-4626-1, USN-4627-1, USN-4628-1, USN-4628-2, VIGILANCE-VUL-33872, XSA-351
Qt5: denial of service via WebSocket 2GB Frames
An attacker can trigger a fatal error via WebSocket 2GB Frames of Qt5, in order to trigger a denial of service...
CVE-2018-21035, RHSA-2020:4690-01, VIGILANCE-VUL-33800
RHEL 8: denial of service via fontforge
An attacker can trigger a fatal error via fontforge of RHEL 8, in order to trigger a denial of service...
CVE-2020-25690, RHBUG-1893188, RHSA-2020:4844-01, VIGILANCE-VUL-33798
FRRouting FRR: information disclosure via split-config
An attacker can bypass access restrictions to data via split-config of FRRouting FRR, in order to obtain sensitive information...
CVE-2020-12831, RHSA-2020:4619-01, VIGILANCE-VUL-33791
libvirt: information disclosure via Virsh Dumpxml Cookie
An attacker can bypass access restrictions to data via Virsh Dumpxml Cookie of libvirt, in order to obtain sensitive information...
CVE-2020-14301, RHBUG-1848640, RHSA-2020:4676-01, VIGILANCE-VUL-33786
RHEL 8: information disclosure via /proc/sys/kernel/rh_features
A local attacker can read a memory fragment via /proc/sys/kernel/rh_features of RHEL 8, in order to obtain sensitive information...
CERTFR-2020-AVI-710, CVE-2020-10774, RHBUG-1846964, RHSA-2020:4431-01, RHSA-2020:4609-01, VIGILANCE-VUL-33784
Podman: information disclosure via Varlink API / Docker-compatible REST API
An attacker can bypass access restrictions to data via Varlink API / Docker-compatible REST API of Podman, in order to obtain sensitive information...
CVE-2020-14370, FEDORA-2020-3a4b8fca5e, FEDORA-2020-76fcd0ba34, openSUSE-SU-2020:2039-1, RHSA-2020:5056-01, SUSE-SU-2020:3378-1, VIGILANCE-VUL-33469
Linux kernel: overload via Zero Length Bvec
An attacker can trigger an overload via Zero Length Bvec of the Linux kernel, in order to trigger a denial of service...
CERTFR-2020-AVI-614, CERTFR-2020-AVI-637, CERTFR-2020-AVI-642, CERTFR-2020-AVI-668, CERTFR-2020-AVI-672, CERTFR-2020-AVI-678, CERTFR-2020-AVI-699, CERTFR-2020-AVI-710, CERTFR-2020-AVI-719, CERTFR-2020-AVI-742, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CERTFR-2020-AVI-776, CVE-2020-25641, DLA-2385-1, DLA-2420-1, DLA-2420-2, openSUSE-SU-2020:1655-1, openSUSE-SU-2020:1698-1, RHSA-2020:4431-01, RHSA-2020:4609-01, RHSA-2020:5079-01, SUSE-SU-2020:2904-1, SUSE-SU-2020:2905-1, SUSE-SU-2020:2906-1, SUSE-SU-2020:2907-1, SUSE-SU-2020:2980-1, SUSE-SU-2020:2999-1, SUSE-SU-2020:3014-1, SUSE-SU-2020:3230-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3503-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, USN-4576-1, VIGILANCE-VUL-33443
Podman: privilege escalation via mounting
An attacker can bypass file permissions by mounting them with Podman, in order to escalate his privileges...
CVE-2020-1726, openSUSE-SU-2020:1552-1, openSUSE-SU-2020:1559-1, RHSA-2020:1650-01, SUSE-SU-2020:2731-1, VIGILANCE-VUL-33409
Our database contains other pages. You can request a free trial to read them.

Display information about CentOS: