The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Red Hat Enterprise Linux

SpamAssassin: code execution via Meta Rule Syntax
An attacker can use a vulnerability via Meta Rule Syntax of SpamAssassin, in order to run code...
CVE-2018-11781, DLA-1578-1, openSUSE-SU-2019:1831-1, RHSA-2018:2916-01, SUSE-SU-2019:1961-1, USN-3811-1, VIGILANCE-VUL-27491
SpamAssassin: denial of service via Unclosed Tags
An attacker can generate a fatal error via Unclosed Tags of SpamAssassin, in order to trigger a denial of service...
CVE-2017-15705, DLA-1578-1, openSUSE-SU-2019:1831-1, RHSA-2018:2916-01, SUSE-SU-2019:1961-1, USN-3811-1, USN-3811-2, USN-3811-3, VIGILANCE-VUL-27490
QEMU: integer overflow via qemu_deliver_packet_iov
An attacker can generate an integer overflow via qemu_deliver_packet_iov() of QEMU, in order to trigger a denial of service, and possibly to run code...
CVE-2018-17963, DLA-1599-1, DSA-4338-1, FEDORA-2018-87f2ace20d, openSUSE-SU-2018:4004-1, openSUSE-SU-2018:4147-1, RHSA-2019:2166-01, SUSE-SU-2018:3332-1, SUSE-SU-2018:3490-1, SUSE-SU-2018:3912-1, SUSE-SU-2018:3927-1, SUSE-SU-2018:3973-1, SUSE-SU-2018:3975-1, SUSE-SU-2018:3987-1, SUSE-SU-2018:4129-1, SUSE-SU-2018:4185-1, SUSE-SU-2018:4237-1, SUSE-SU-2019:0003-1, SUSE-SU-2019:0825-1, SUSE-SU-2019:0827-1, SUSE-SU-2019:13921-1, SUSE-SU-2019:14011-1, USN-3826-1, VIGILANCE-VUL-27435
QEMU: buffer overflow via pcnet_receive
An attacker can generate a buffer overflow via pcnet_receive() of QEMU, in order to trigger a denial of service, and possibly to run code...
CVE-2018-17962, DLA-1599-1, DSA-4338-1, FEDORA-2018-87f2ace20d, openSUSE-SU-2018:4004-1, openSUSE-SU-2018:4147-1, RHSA-2019:2892-01, SUSE-SU-2018:3912-1, SUSE-SU-2018:3927-1, SUSE-SU-2018:3973-1, SUSE-SU-2018:3975-1, SUSE-SU-2018:3987-1, SUSE-SU-2018:4129-1, SUSE-SU-2018:4185-1, SUSE-SU-2018:4237-1, SUSE-SU-2019:0825-1, SUSE-SU-2019:0827-1, SUSE-SU-2019:13921-1, SUSE-SU-2019:14011-1, USN-3826-1, VIGILANCE-VUL-27434
QEMU: integer overflow via ne2000_receive
An attacker can generate an integer overflow via ne2000_receive() of QEMU, in order to trigger a denial of service, and possibly to run code...
CVE-2018-10839, DLA-1599-1, DSA-4338-1, FEDORA-2018-87f2ace20d, openSUSE-SU-2018:4004-1, openSUSE-SU-2018:4147-1, RHSA-2019:2892-01, SUSE-SU-2018:3912-1, SUSE-SU-2018:3927-1, SUSE-SU-2018:3973-1, SUSE-SU-2018:3975-1, SUSE-SU-2018:3987-1, SUSE-SU-2018:4129-1, SUSE-SU-2018:4185-1, SUSE-SU-2018:4237-1, SUSE-SU-2019:0825-1, SUSE-SU-2019:0827-1, SUSE-SU-2019:13921-1, SUSE-SU-2019:14011-1, USN-3826-1, VIGILANCE-VUL-27432
OpenSC: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenSC...
CVE-2018-16418, CVE-2018-16419, CVE-2018-16420, CVE-2018-16421, CVE-2018-16422, CVE-2018-16423, CVE-2018-16424, CVE-2018-16425, CVE-2018-16426, CVE-2018-16427, DLA-1916-1, DSA-2020-030, FEDORA-2018-d0dff2abaa, openSUSE-SU-2018:3701-1, openSUSE-SU-2018:3716-1, RHSA-2019:2154-01, SUSE-SU-2018:3621-1, SUSE-SU-2018:3622-1, SUSE-SU-2018:3622-2, VIGILANCE-VUL-27431
Git: code execution via Clone Gitmodules Hyphen Url
An attacker can use a vulnerability via Clone Gitmodules Hyphen Url of Git, in order to run code...
bulletinoct2018, CVE-2018-17456, DLA-1533-1, DSA-4311-1, FEDORA-2018-1c1a318a0b, FEDORA-2018-42eab0f5b9, FEDORA-2018-7d993184f6, FEDORA-2018-d5139c4fd6, openSUSE-SU-2018:3109-1, openSUSE-SU-2018:3178-1, openSUSE-SU-2018:4051-1, RHSA-2018:3408-01, RHSA-2018:3541-01, RHSA-2020:0316-01, SSA:2018-283-01, SUSE-SU-2018:3150-1, SUSE-SU-2018:4009-1, SUSE-SU-2018:4088-1, SUSE-SU-2018:4088-3, USN-3791-1, VIGILANCE-VUL-27424
Linux kernel: information disclosure via proc_pid_stack
An attacker can bypass access restrictions to data via proc_pid_stack() of the Linux kernel, in order to obtain sensitive information...
1798863, CERTFR-2018-AVI-557, CERTFR-2018-AVI-581, CERTFR-2018-AVI-583, CERTFR-2019-AVI-035, CERTFR-2019-AVI-041, CERTFR-2019-AVI-044, CERTFR-2019-AVI-112, CERTFR-2019-AVI-183, CERTFR-2019-AVI-390, CVE-2018-17972, DLA-1715-1, DLA-1731-1, DLA-1731-2, FEDORA-2018-2ee3411cb8, FEDORA-2018-9f4381d8c4, FEDORA-2018-ec3bf1b228, JSA10993, K27673650, openSUSE-SU-2019:1407-1, RHSA-2019:0512-01, RHSA-2019:0514-01, RHSA-2019:0831-01, RHSA-2019:2473-01, SSA:2019-030-01, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1692-1, USN-3821-1, USN-3821-2, USN-3832-1, USN-3835-1, USN-3871-1, USN-3871-2, USN-3871-3, USN-3871-4, USN-3871-5, USN-3880-1, USN-3880-2, VIGILANCE-VUL-27416
Apache Tomcat: open redirect via Directory Redirect
An attacker can deceive the user via Directory Redirect of Apache Tomcat, in order to redirect him to a malicious site...
bulletinoct2018, cpuapr2019, cpujan2020, cpuoct2019, CVE-2018-11784, DLA-1544-1, DLA-1545-1, DSA-4596-1, FEDORA-2018-b18f9dd65b, FEDORA-2018-b89746cb9b, ibm10874888, NTAP-20181014-0002, openSUSE-SU-2018:3453-1, openSUSE-SU-2018:4042-1, openSUSE-SU-2019:0084-1, openSUSE-SU-2019:1547-1, openSUSE-SU-2019:1814-1, RHSA-2019:0130-01, RHSA-2019:0131-01, RHSA-2019:0485-01, RHSA-2019:1529-01, SB10257, SB10264, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, SUSE-SU-2018:3393-1, SUSE-SU-2018:3935-1, SUSE-SU-2018:3968-1, USN-3787-1, VIGILANCE-VUL-27396
elfutils: out-of-bounds memory reading via dwarf_getaranges
An attacker can force a read at an invalid address via dwarf_getaranges() of elfutils, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2018-16062, DLA-1689-1, FEDORA-2018-1eec1f0d17, openSUSE-SU-2019:1590-1, RHSA-2019:2197-01, SUSE-SU-2019:1486-1, SUSE-SU-2019:1733-1, USN-4012-1, VIGILANCE-VUL-27381
Our database contains other pages. You can request a free trial to read them.

Display information about Red Hat Enterprise Linux: