The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Red Hat Enterprise Linux

Python Pillow: denial of service via Image Files
An attacker can trigger a fatal error via Image Files of Python Pillow, in order to trigger a denial of service...
CVE-2019-16865, DSA-4631-1, FEDORA-2019-19a161d540, FEDORA-2019-e7c83bdf19, JSA11174, JSA11176, RHSA-2020:0566-01, RHSA-2020:0578-01, RHSA-2020:0580-01, USN-4272-1, VIGILANCE-VUL-31027
FreeRADIUS: information disclosure via EAP-PWD 10 Iterations
An attacker can bypass access restrictions to data via EAP-PWD 10 Iterations of FreeRADIUS, in order to obtain sensitive information...
CVE-2019-13456, CVE-2019-20510-REJECT, FEDORA-2019-17ed521527, FEDORA-2019-ca0f5e835d, openSUSE-SU-2020:0553-1, RHSA-2020:1672-01, RHSA-2020:3984-01, SUSE-SU-2020:1023-1, SUSE-SU-2020:2391-1, VIGILANCE-VUL-31025
grub2: denial of service via grub2-set-bootflag
An attacker can trigger a fatal error via grub2-set-bootflag of grub2, in order to trigger a denial of service...
CVE-2019-14865, FEDORA-2019-e99ebf23c8, RHSA-2020:0335-01, VIGILANCE-VUL-31023
Linux kernel: use after free via ext4_xattr_set_entry
An attacker can force the usage of a freed memory area via ext4_xattr_set_entry() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
1158021, CERTFR-2020-AVI-029, CERTFR-2020-AVI-119, CERTFR-2020-AVI-124, CERTFR-2020-AVI-130, CERTFR-2020-AVI-318, CERTFR-2020-AVI-356, CERTFR-2020-AVI-368, CERTFR-2020-AVI-710, CVE-2019-19319, DLA-2241-1, DLA-2241-2, DLA-2242-1, DSA-4698-1, openSUSE-SU-2020:0336-1, RHSA-2020:4431-01, RHSA-2020:4609-01, SSA:2020-163-01, SUSE-SU-2020:0093-1, SUSE-SU-2020:0511-1, SUSE-SU-2020:0559-1, SUSE-SU-2020:0560-1, SUSE-SU-2020:0580-1, SUSE-SU-2020:0599-1, SUSE-SU-2020:1255-1, SUSE-SU-2020:1663-1, USN-4391-1, VIGILANCE-VUL-31021
Linux kernel: information disclosure via Powerpc Spectre-RSB
An attacker can bypass access restrictions to data via Powerpc Spectre-RSB of the Linux kernel, in order to obtain sensitive information...
CERTFR-2019-AVI-612, CERTFR-2019-AVI-639, CERTFR-2019-AVI-652, CERTFR-2020-AVI-005, CERTFR-2020-AVI-013, CERTFR-2020-AVI-029, CERTFR-2020-AVI-046, CERTFR-2020-AVI-051, CERTFR-2020-AVI-130, CERTFR-2020-AVI-180, CERTFR-2020-AVI-258, CERTFR-2020-AVI-260, CERTFR-2020-AVI-318, CERTFR-2020-AVI-355, CERTFR-2020-AVI-415, CERTFR-2020-AVI-450, CVE-2019-18660, FEDORA-2019-124a241044, FEDORA-2019-b86a7bdba0, JSA11174, JSA11176, openSUSE-SU-2019:2675-1, RHSA-2020:0174-01, RHSA-2020:1016-01, RHSA-2020:1372-01, RHSA-2020:1984-01, RHSA-2020:2429-01, RHSA-2020:2851-01, RHSA-2020:2933-01, SSA:2020-008-01, SUSE-SU-2019:3200-1, SUSE-SU-2019:3289-1, SUSE-SU-2019:3316-1, SUSE-SU-2019:3317-1, SUSE-SU-2019:3371-1, SUSE-SU-2019:3372-1, SUSE-SU-2019:3379-1, SUSE-SU-2019:3381-1, SUSE-SU-2020:0093-1, SUSE-SU-2020:0599-1, SUSE-SU-2020:1255-1, SUSE-SU-2020:14354-1, USN-4225-1, USN-4225-2, USN-4226-1, USN-4227-1, USN-4227-2, USN-4228-1, USN-4228-2, VIGILANCE-VUL-31018
mod_auth_mellon: open redirect via Login ReturnTo
An attacker can deceive the user via Login ReturnTo of mod_auth_mellon, in order to redirect him to a malicious site...
bulletinapr2020, CVE-2019-13038, FEDORA-2019-1444823e77, FEDORA-2019-e8d74ece30, RHSA-2020:1003-01, RHSA-2020:1660-01, USN-4291-1, VIGILANCE-VUL-31013
389 Directory Server: information disclosure via Deref Plugin
An attacker can bypass access restrictions to data via Deref Plugin of 389 Directory Server, in order to obtain sensitive information...
CVE-2019-14824, DLA-2004-1, RHSA-2019:3401-01, RHSA-2019:3981-01, RHSA-2020:0464-01, VIGILANCE-VUL-30987
FreeIPA: buffer overflow via ber_scanf
An attacker can trigger a buffer overflow via ber_scanf() of FreeIPA, in order to trigger a denial of service, and possibly to run code...
CVE-2019-14867, FEDORA-2019-8e9093da55, FEDORA-2019-c64e1612f5, RHSA-2020:0378-01, RHSA-2020:1269-01, VIGILANCE-VUL-30986
FreeIPA: information disclosure via Command Logged Passwords
An attacker can bypass access restrictions to data via Command Logged Passwords of FreeIPA, in order to obtain sensitive information...
CVE-2019-10195, FEDORA-2019-8e9093da55, FEDORA-2019-c64e1612f5, RHSA-2020:0378-01, RHSA-2020:1269-01, VIGILANCE-VUL-30985
WebKitGTK: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
CVE-2019-8707, CVE-2019-8710, CVE-2019-8719, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8743, CVE-2019-8763, CVE-2019-8764, CVE-2019-8765, CVE-2019-8766, openSUSE-SU-2019:2587-1, openSUSE-SU-2019:2591-1, RHSA-2020:4035-01, RHSA-2020:4451-01, SUSE-SU-2019:3044-1, SUSE-SU-2020:1135-1, VIGILANCE-VUL-30975
Our database contains other pages. You can request a free trial to read them.

Display information about Red Hat Enterprise Linux: