The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of RHEL

vulnerability announce CVE-2015-5288 CVE-2015-5289

PostgreSQL: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PostgreSQL.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/10/2015.
Identifiers: CERTFR-2015-AVI-433, CVE-2015-5288, CVE-2015-5289, DSA-2019-131, DSA-3374-1, DSA-3475-1, FEDORA-2015-6d2a957a87, openSUSE-SU-2015:1907-1, openSUSE-SU-2015:1919-1, RHSA-2015:2077-01, RHSA-2015:2078-01, RHSA-2015:2081-01, RHSA-2015:2083-01, SUSE-SU-2016:0677-1, USN-2772-1, VIGILANCE-VUL-18062.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in PostgreSQL.

An attacker can trigger a fatal error when json/jsonb data are analyzed, in order to trigger a denial of service. [severity:2/4; CVE-2015-5289]

An attacker can read a memory fragment via the crypt() function, in order to obtain sensitive information. [severity:1/4; CVE-2015-5288]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2015-5260 CVE-2015-5261

Spice: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Spice.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 07/10/2015.
Identifiers: CVE-2015-5260, CVE-2015-5261, DSA-3371-1, FEDORA-2015-7fcc957ba6, openSUSE-SU-2015:1750-1, RHSA-2015:1889-01, RHSA-2015:1890-01, USN-2766-1, VIGILANCE-VUL-18051.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Spice.

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2015-5260]

An attacker can bypass access restrictions, in order to read or alter data in memory. [severity:2/4; CVE-2015-5261]
Full Vigil@nce bulletin... (Free trial)

threat alert CVE-2015-7804

PHP: denial of service via phar_make_dirstream

Synthesis of the vulnerability

An attacker can force an invalid pointer to be dereferenced in the phar_make_dirstream() function of PHP, in order to trigger a denial of service.
Severity: 1/4.
Creation date: 05/10/2015.
Identifiers: 70433, CVE-2015-7804, DSA-3380-1, FEDORA-2015-366f3dd73f, FEDORA-2015-b24a52fc97, openSUSE-SU-2016:0251-1, RHSA-2016:0457-01, USN-2786-1, VIGILANCE-VUL-18041.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The phar extension can be installed on PHP.

However, when the phar_make_dirstream() function processes a ZIP archive containing the "/" file, it does not check if a pointer is valid, before using it.

An attacker can therefore force an invalid pointer to be dereferenced in the phar_make_dirstream() function of PHP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

cybersecurity threat CVE-2015-7613

Linux kernel: privilege escalation via IPC

Synthesis of the vulnerability

A local attacker can manipulate IPC on the Linux kernel, in order to escalate his privileges.
Severity: 2/4.
Creation date: 02/10/2015.
Identifiers: CERTFR-2015-AVI-419, CERTFR-2015-AVI-430, CERTFR-2015-AVI-498, CVE-2015-7613, DSA-3372-1, FEDORA-2015-d7e074ba30, FEDORA-2015-dcc260f2f2, JSA10853, K90230486, RHSA-2015:2152-02, RHSA-2015:2411-01, RHSA-2015:2587-01, RHSA-2015:2636-01, SB10146, SOL90230486, SUSE-SU-2015:1727-1, SUSE-SU-2015:2084-1, SUSE-SU-2015:2085-1, SUSE-SU-2015:2086-1, SUSE-SU-2015:2087-1, SUSE-SU-2015:2089-1, SUSE-SU-2015:2090-1, SUSE-SU-2015:2091-1, USN-2761-1, USN-2762-1, USN-2763-1, USN-2764-1, USN-2765-1, USN-2792-1, USN-2796-1, VIGILANCE-VUL-18021.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The shmget() system call creates a shared memory segment with IPC_CREAT, so two processes can communicate via IPC.

The newque() function of the ipc/msg.c function of the Linux kernel creates this segment. However, it calls ipc_addid() too soon, so the uid associated to the segment is incorrect.

A local attacker can therefore manipulate IPC on the Linux kernel, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

security weakness CVE-2015-7803

PHP: NULL pointer dereference via phar_get_fp_offset

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced in the phar_get_fp_offset() function of PHP, in order to trigger a denial of service.
Severity: 1/4.
Creation date: 02/10/2015.
Identifiers: 69720, CVE-2015-7803, DSA-3380-1, FEDORA-2015-366f3dd73f, FEDORA-2015-b24a52fc97, openSUSE-SU-2016:0251-1, openSUSE-SU-2016:0366-1, RHSA-2016:0457-01, SUSE-SU-2016:1145-1, SUSE-SU-2016:1581-1, SUSE-SU-2016:1638-1, USN-2786-1, VIGILANCE-VUL-18020.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The phar extension can be installed on PHP.

However, when the phar_get_fp_offset() function processes a special ZIP archive, it does not check if a pointer is NULL, before using it.

An attacker can therefore force a NULL pointer to be dereferenced in the phar_get_fp_offset() function of PHP, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

weakness alert CVE-2015-1303 CVE-2015-1304

Google Chrome: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Google Chrome.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 25/09/2015.
Identifiers: CERTFR-2015-AVI-409, CVE-2015-1303, CVE-2015-1304, DSA-3376-1, openSUSE-SU-2015:1719-1, openSUSE-SU-2015:1867-1, openSUSE-SU-2015:1872-1, openSUSE-SU-2015:1873-1, openSUSE-SU-2015:1876-1, openSUSE-SU-2015:1877-1, openSUSE-SU-2015:1887-1, RHSA-2015:1841-01, USN-2757-1, VIGILANCE-VUL-17983.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Google Chrome.

An attacker can use DOM, in order to run JavaScript code in the context of another web site. [severity:2/4; CVE-2015-1303]

An attacker can use V8, in order to run JavaScript code in the context of another web site. [severity:2/4; CVE-2015-1304]
Full Vigil@nce bulletin... (Free trial)

security alert CVE-2015-3253

Apache Groovy: code execution via MethodClosure

Synthesis of the vulnerability

An attacker can use a vulnerability in MethodClosure of Apache Groovy, in order to run code.
Severity: 2/4.
Creation date: 24/09/2015.
Identifiers: c05324755, cpuapr2019, cpujan2018, cpujul2017, cpuoct2016, cpuoct2017, CVE-2015-3253, FEDORA-2015-15907, FEDORA-2017-6a0389a6a7, FEDORA-2017-9899aba20e, HPSBGN03669, RHSA-2015:2556-01, RHSA-2015:2557-01, RHSA-2015:2558-01, RHSA-2016:0066-01, RHSA-2016:0118-01, RHSA-2017:2596-01, SA110, VIGILANCE-VUL-17973.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use a vulnerability in MethodClosure of Apache Groovy, in order to run code.
Full Vigil@nce bulletin... (Free trial)

cybersecurity note CVE-2015-7236

rpcbind: use after free

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area of rpcbind, in order to trigger a denial of service, and possibly to run code.
Severity: 2/4.
Creation date: 24/09/2015.
Identifiers: CVE-2015-7236, DSA-3366-1, FEDORA-2015-36b145bd37, FEDORA-2015-9eee2fbc78, FreeBSD-SA-15:24.rpcbind, JSA10838, JSA10860, RHSA-2016:0005-01, USN-2756-1, VIGILANCE-VUL-17967.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force the usage of a freed memory area of rpcbind, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

security vulnerability CVE-2015-4476 CVE-2015-4500 CVE-2015-4501

Firefox, Thunderbird: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Firefox/Thunderbird.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 19.
Creation date: 23/09/2015.
Identifiers: CERTFR-2015-AVI-405, CVE-2015-4476, CVE-2015-4500, CVE-2015-4501, CVE-2015-4502, CVE-2015-4503, CVE-2015-4504, CVE-2015-4505, CVE-2015-4506, CVE-2015-4507, CVE-2015-4508, CVE-2015-4509, CVE-2015-4510, CVE-2015-4511, CVE-2015-4512, CVE-2015-4516, CVE-2015-4517, CVE-2015-4519, CVE-2015-4520, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7178, CVE-2015-7179, CVE-2015-7180, CVE-2015-7327, DSA-3365-1, FEDORA-2015-15831, FEDORA-2015-15832, FEDORA-2015-16455, FEDORA-2015-480a88a4c8, MFSA-2015-100, MFSA-2015-101, MFSA-2015-102, MFSA-2015-103, MFSA-2015-104, MFSA-2015-105, MFSA-2015-106, MFSA-2015-107, MFSA-2015-108, MFSA-2015-109, MFSA-2015-110, MFSA-2015-111, MFSA-2015-112, MFSA-2015-113, MFSA-2015-114, MFSA-2015-96, MFSA-2015-97, MFSA-2015-98, MFSA-2015-99, openSUSE-SU-2015:1658-1, openSUSE-SU-2015:1679-1, openSUSE-SU-2015:1681-1, RHSA-2015:1834-01, RHSA-2015:1834-02, RHSA-2015:1852-01, SSA:2015-265-01, SSA:2015-274-01, SSA:2015-274-03, SUSE-SU-2015:1680-1, SUSE-SU-2015:1703-1, SUSE-SU-2015:2081-1, USN-2743-1, USN-2743-2, USN-2743-3, USN-2743-4, USN-2754-1, VIGILANCE-VUL-17954, ZDI-15-646.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Firefox/Thunderbird.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-4500, CVE-2015-4501, MFSA-2015-96]

An attacker can create a memory leak in mozTCPSocket, in order to trigger a denial of service. [severity:2/4; CVE-2015-4503, MFSA-2015-97]

An attacker can force a read at an invalid address in mozTCPSocketQCMS, in order to trigger a denial of service. [severity:2/4; CVE-2015-4504, MFSA-2015-98]

An attacker can spoof an url on Android. [severity:2/4; CVE-2015-4476, MFSA-2015-99]

An attacker can bypass access restrictions of Mozilla Updater, in order to read or alter files. [severity:2/4; CVE-2015-4505, MFSA-2015-100]

An attacker can generate a buffer overflow in libvpx, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2015-4506, MFSA-2015-101]

An attacker can trigger a fatal error in SavedStacks, in order to trigger a denial of service. [severity:1/4; CVE-2015-4507, MFSA-2015-102]

An attacker can spoof an url in reader mode. [severity:1/4; CVE-2015-4508, MFSA-2015-103]

An attacker can force the usage of a freed memory area in IndexedDB, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-4510, MFSA-2015-104]

An attacker can generate a buffer overflow in WebM, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2015-4511, MFSA-2015-105]

An attacker can force the usage of a freed memory area in HTML Media Content, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-4509, MFSA-2015-106, ZDI-15-646]

An attacker can force a read at an invalid address in 2D Canvas on Linux 16-bit Color, in order to trigger a denial of service. [severity:1/4; CVE-2015-4512, MFSA-2015-107]

An attacker can use a Scripted Proxy, in order to access to a window. [severity:2/4; CVE-2015-4502, MFSA-2015-108]

An attacker can bypass security features of a JavaScript Immutable Property, in order to escalate his privileges. [severity:3/4; CVE-2015-4516, MFSA-2015-109]

An attacker can use a drag-and-drop, in order to obtain sensitive information. [severity:3/4; CVE-2015-4519, MFSA-2015-110]

An attacker can bypass security features in CORS, in order to escalate his privileges. [severity:3/4; CVE-2015-4520, MFSA-2015-111]

An unknown vulnerability was announced. [severity:3/4; CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180, MFSA-2015-112]

An attacker can generate a memory corruption in libGLES, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-7178, CVE-2015-7179, MFSA-2015-113]

An attacker can bypass security features in High Resolution Time API, in order to obtain sensitive information. [severity:2/4; CVE-2015-7327, MFSA-2015-114]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2015-5567 CVE-2015-5568 CVE-2015-5570

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 23.
Creation date: 22/09/2015.
Identifiers: 2755801, 451, APSB15-23, CERTFR-2015-AVI-404, CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682, openSUSE-SU-2015:1616-1, openSUSE-SU-2015:1781-1, RHSA-2015:1814-01, SUSE-SU-2015:1614-1, SUSE-SU-2015:1618-1, VIGILANCE-VUL-17945, ZDI-15-446, ZDI-15-447.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Adobe Flash Player.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5573]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5570, ZDI-15-447]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5574]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5581]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5584]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6682]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6676]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6678, ZDI-15-446]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5575]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5577]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5578]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5580]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5582]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5588]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6677]

An attacker can use a vulnerability in JSONP Callback API, in order to run code. [severity:3/4; CVE-2015-5571]

An attacker can create a memory leak, in order to trigger a denial of service. [severity:2/4; CVE-2015-5576]

An attacker can use a vulnerability in Vector Length Corruption, in order to run code. [severity:4/4; CVE-2015-5568]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5567]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5579]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-5587]

An attacker can bypass security features, in order to obtain sensitive information. [severity:2/4; CVE-2015-5572]

An attacker can bypass security features in same-origin-policy, in order to obtain sensitive information. [severity:2/4; CVE-2015-6679]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about RHEL: