The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of IBM i

IBM Power9 Processor: information disclosure via L1 Cache
An attacker can bypass access restrictions to data via L1 Cache of IBM Power9 Processor, in order to obtain sensitive information...
6370719, CERTFR-2020-AVI-786, CERTFR-2020-AVI-794, CERTFR-2020-AVI-811, CERTFR-2020-AVI-837, CERTFR-2021-AVI-006, CERTFR-2021-AVI-021, CERTFR-2021-AVI-035, CERTFR-2021-AVI-111, CERTFR-2021-AVI-120, CERTFR-2021-AVI-125, CVE-2020-4788, FEDORA-2020-4700a73bd5, FEDORA-2020-8c15928d23, openSUSE-SU-2020:2161-1, openSUSE-SU-2020:2193-1, openSUSE-SU-2020:2260-1, openSUSE-SU-2021:0075-1, openSUSE-SU-2021:0242-1, SUSE-SU-2020:3713-1, SUSE-SU-2020:3748-1, SUSE-SU-2020:3764-1, SUSE-SU-2020:3766-1, SUSE-SU-2020:3798-1, SUSE-SU-2021:0097-1, SUSE-SU-2021:0098-1, SUSE-SU-2021:0118-1, SUSE-SU-2021:0133-1, SUSE-SU-2021:0434-1, SUSE-SU-2021:0438-1, SUSE-SU-2021:0452-1, SUSE-SU-2021:14630-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4660-1, USN-4660-2, USN-4681-1, VIGILANCE-VUL-33943
Samba: three vulnerabilities
An attacker can use several vulnerabilities of Samba...
6366855, CERTFR-2020-AVI-694, CVE-2020-14318, CVE-2020-14323, CVE-2020-14383, DLA-2463-1, FEDORA-2020-2e1a1489be, FEDORA-2020-c1e9ae02d2, openSUSE-SU-2020:1811-1, openSUSE-SU-2020:1819-1, RHSA-2020:5439-01, SUSE-SU-2020:14525-1, SUSE-SU-2020:3081-1, SUSE-SU-2020:3082-1, SUSE-SU-2020:3083-1, SUSE-SU-2020:3087-1, SUSE-SU-2020:3092-1, SUSE-SU-2020:3093-1, USN-4611-1, VIGILANCE-VUL-33732
Oracle Java, OpenJDK: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
6379260, 6410566, 6410876, 6411251, 6411255, 6415639, CERTFR-2020-AVI-663, cpuoct2020, CVE-2020-14779, CVE-2020-14781, CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798, CVE-2020-14803, DLA-2412-1, DLA-2412-2, DSA-2020-278, DSA-2021-001, DSA-4779-1, FEDORA-2020-421f817e5f, FEDORA-2020-81e511d0d8, FEDORA-2020-84137f197e, FEDORA-2020-a405eea76a, FEDORA-2020-d1b8d3f94a, FEDORA-2020-fdc79d8e5b, FEDORA-2020-febe36c3ac, openSUSE-SU-2020:1893-1, openSUSE-SU-2020:1984-1, openSUSE-SU-2020:1994-1, openSUSE-SU-2020:2048-1, openSUSE-SU-2020:2083-1, openSUSE-SU-2020:2170-1, RHSA-2020:4305-01, RHSA-2020:4306-01, RHSA-2020:4307-01, RHSA-2020:4316-01, RHSA-2020:4347-01, RHSA-2020:4348-01, RHSA-2020:4349-01, RHSA-2020:4350-01, RHSA-2020:4352-01, RHSA-2020:5585-01, RHSA-2020:5586-01, RHSA-2021:0530-01, SUSE-SU-2020:14587-1, SUSE-SU-2020:14588-1, SUSE-SU-2020:3159-1, SUSE-SU-2020:3191-1, SUSE-SU-2020:3310-1, SUSE-SU-2020:3359-1, SUSE-SU-2020:3460-1, SUSE-SU-2020:3591-1, SUSE-SU-2020:3932-1, SUSE-SU-2021:0019-1, SUSE-SU-2021:0032-1, SUSE-SU-2021:0512-1, SUSE-SU-2021:0652-1, SUSE-SU-2021:14634-1, SUSE-SU-2021:14640-1, USN-4607-1, VIGILANCE-VUL-33649
ISC BIND: privilege escalation via Update-policy Rules
An attacker can bypass restrictions via Update-policy Rules of ISC BIND, in order to escalate his privileges...
6350241, 6403291, CERTFR-2020-AVI-523, CVE-2020-8624, DSA-4752-1, K91090139, openSUSE-SU-2020:1699-1, openSUSE-SU-2020:1701-1, RHSA-2020:4500-01, RHSA-2020:5011-01, RHSA-2020:5203-01, SSA:2020-234-01, SUSE-SU-2020:2914-1, Synology-SA-20:19, USN-4468-1, USN-4468-2, VIGILANCE-VUL-33130
Eclipse OpenJ9: denial of service via System.arraycopy
An attacker can trigger a fatal error via System.arraycopy() of Eclipse OpenJ9, in order to trigger a denial of service...
6338655, CVE-2019-17639, RHSA-2020:3386-01, RHSA-2020:3387-01, RHSA-2020:3388-01, RHSA-2020:5585-01, SUSE-SU-2020:14482-1, SUSE-SU-2020:14484-1, SUSE-SU-2020:2453-1, SUSE-SU-2020:2461-1, SUSE-SU-2020:2482-1, VIGILANCE-VUL-33041
Apache httpd: IP Address Spoofing via mod_remoteip/mod_rewrite
An attacker can spoof an IP address via mod_remoteip/mod_rewrite of Apache httpd, in order to deceive the victim...
6327365, 6328811, bulletinjul2020, CVE-2020-11985, FEDORA-2020-0d3d3f5072, FEDORA-2020-189a1e6c3e, SUSE-SU-2020:2450-1, VIGILANCE-VUL-33035
ISC BIND: denial of service via tsig.c
An attacker can trigger a fatal error via tsig.c of ISC BIND, in order to trigger a denial of service...
6244244, 6344107, CERTFR-2020-AVI-302, CERTFR-2021-AVI-033, CVE-2020-8617, DLA-2227-1, DSA-4689-1, JSA11091, JSA11110, K05544642, openSUSE-SU-2020:1699-1, openSUSE-SU-2020:1701-1, RHSA-2020:2338-01, RHSA-2020:2344-01, RHSA-2020:2345-01, RHSA-2020:2383-01, RHSA-2020:2404-01, RHSA-2020:2893-01, RHSA-2020:3378-01, RHSA-2020:3379-01, RHSA-2020:3433-01, RHSA-2020:3470-01, RHSA-2020:3471-01, RHSA-2020:3475-01, SSA:2020-140-01, SUSE-SU-2020:14400-1, SUSE-SU-2020:2914-1, USN-4365-1, USN-4365-2, VIGILANCE-VUL-32332
ISC BIND: overload via NXNSAttack On Recursive Resolvers
An attacker can trigger an overload via NXNSAttack On Recursive Resolvers of ISC BIND, in order to trigger a denial of service...
6244244, 6344107, CERTFR-2020-AVI-302, CERTFR-2021-AVI-033, CVE-2020-8616, DLA-2227-1, DSA-4689-1, JSA11090, JSA11110, K97810133, openSUSE-SU-2020:1699-1, openSUSE-SU-2020:1701-1, RHSA-2020:2338-01, RHSA-2020:2344-01, RHSA-2020:2345-01, RHSA-2020:2383-01, RHSA-2020:2404-01, RHSA-2020:3272-01, RHSA-2020:3378-01, RHSA-2020:3379-01, RHSA-2020:3433-01, RHSA-2020:3470-01, RHSA-2020:3471-01, RHSA-2020:3475-01, SSA:2020-140-01, SUSE-SU-2020:14400-1, SUSE-SU-2020:2914-1, USN-4365-1, USN-4365-2, VIGILANCE-VUL-32300
IBM i SQL: information disclosure
An attacker can bypass access restrictions to data of IBM i SQL, in order to obtain sensitive information...
6208661, CVE-2020-4345, VIGILANCE-VUL-32285
OpenSSL: NULL pointer dereference via SSL_check_chain
An attacker can force a NULL pointer to be dereferenced via SSL_check_chain() of OpenSSL, in order to trigger a denial of service...
6235728, 6409294, bulletinjul2020, CERTFR-2020-AVI-235, cpujul2020, cpuoct2020, CVE-2020-1967, DSA-4661-1, FreeBSD-SA-20:11.openssl, JSA11074, openSUSE-SU-2020:0933-1, openSUSE-SU-2020:0945-1, SUSE-SU-2020:1058-1, SUSE-SU-2020:2041-1, VIGILANCE-VUL-32076
Our database contains other pages. You can request a free trial to read them.

Display information about IBM i: