The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of RedHat Enterprise Linux

LibreOffice/OpenOffice: information disclosure via SMB Credentials
An attacker can bypass access restrictions to data via SMB Credential of LibreOffice/OpenOffice, in order to obtain sensitive information...
CVE-2018-10583, openSUSE-SU-2018:2532-1, openSUSE-SU-2018:2533-1, openSUSE-SU-2018:3796-1, RHSA-2018:3054-01, SUSE-SU-2018:2485-1, SUSE-SU-2018:2485-2, SUSE-SU-2018:2535-1, SUSE-SU-2018:3683-1, USN-3883-1, VIGILANCE-VUL-26023
GraphicsMagick: infinite loop via PNG
An attacker can generate an infinite loop via PNG of GraphicsMagick, in order to trigger a denial of service...
bulletinoct2018, CVE-2018-10177, DLA-2333-1, openSUSE-SU-2018:1123-1, openSUSE-SU-2018:1205-1, RHSA-2020:1180-01, USN-3681-1, VIGILANCE-VUL-26020
GraphicsMagick: memory leak via WriteGIFImage
An attacker can create a memory leak via WriteGIFImage() of GraphicsMagick, in order to trigger a denial of service...
CVE-2017-18254, openSUSE-SU-2018:1123-1, openSUSE-SU-2018:1205-1, RHSA-2020:1180-01, USN-3681-1, VIGILANCE-VUL-26019
GraphicsMagick: memory leak via ReadPCDImage
An attacker can create a memory leak via ReadPCDImage() of GraphicsMagick, in order to trigger a denial of service...
CVE-2017-18251, openSUSE-SU-2018:1123-1, openSUSE-SU-2018:1205-1, RHSA-2020:1180-01, USN-3681-1, VIGILANCE-VUL-26018
WebKitGTK+: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK+...
bulletinoct2018, CVE-2018-4101, CVE-2018-4113, CVE-2018-4114, CVE-2018-4117, CVE-2018-4118, CVE-2018-4119, CVE-2018-4120, CVE-2018-4122, CVE-2018-4125, CVE-2018-4127, CVE-2018-4128, CVE-2018-4129, CVE-2018-4133, CVE-2018-4146, CVE-2018-4161, CVE-2018-4162, CVE-2018-4163, CVE-2018-4165, DSA-4256-1, FEDORA-2018-499f2dbc96, HT208693, openSUSE-SU-2018:2134-1, openSUSE-SU-2018:2135-1, openSUSE-SU-2018:3473-1, openSUSE-SU-2019:0081-1, RHSA-2018:2282-01, SUSE-SU-2018:3387-1, SUSE-SU-2019:0092-1, USN-3635-1, VIGILANCE-VUL-26013
Chrome: use after free via Media Cache
An attacker can force the usage of a freed memory area via Media Cache of Chrome, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-209, CVE-2018-6118, DSA-4237-1, openSUSE-SU-2018:1104-1, openSUSE-SU-2018:1175-1, openSUSE-SU-2018:1437-1, RHSA-2018:1321-01, VIGILANCE-VUL-26012
Linux kernel: privilege escalation via Ptrace Hardware Breakpoint Settings
An attacker can bypass restrictions via Ptrace Hardware Breakpoint Settings of the Linux kernel, in order to escalate his privileges...
CERTFR-2018-AVI-226, CERTFR-2018-AVI-228, CERTFR-2018-AVI-256, CERTFR-2018-AVI-308, CERTFR-2018-AVI-319, CERTFR-2018-AVI-584, CERTFR-2020-AVI-376, CERTFR-2020-AVI-547, CVE-2018-1000199, DLA-1369-1, DSA-4187-1, DSA-4188-1, ibm10742755, openSUSE-SU-2018:1418-1, openSUSE-SU-2020:0801-1, RHSA-2018:1318-01, RHSA-2018:1345-01, RHSA-2018:1347-01, RHSA-2018:1348-01, RHSA-2018:1354-01, RHSA-2018:1355-01, RHSA-2018:1374-01, SUSE-SU-2018:1366-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1374-1, SUSE-SU-2018:1375-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1816-1, SUSE-SU-2018:1846-1, SUSE-SU-2018:1855-1, SUSE-SU-2020:1599-1, SUSE-SU-2020:1663-1, SUSE-SU-2020:2156-1, SUSE-SU-2020:2478-1, SUSE-SU-2020:2487-1, Synology-SA-18:51, USN-3641-1, USN-3641-2, VIGILANCE-VUL-25999
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
bulletinapr2018, CERTFR-2018-AVI-207, CVE-2018-10545, CVE-2018-10546, CVE-2018-10547, CVE-2018-10548, CVE-2018-10549, DLA-1373-1, DLA-1397-1, DSA-4240-1, FEDORA-2018-04f6056c42, FEDORA-2018-6071a600e8, FEDORA-2018-ee6707d519, openSUSE-SU-2018:1207-1, openSUSE-SU-2018:1317-1, RHSA-2019:2519-01, RHSA-2020:1112-01, SSA:2018-136-02, SUSE-SU-2018:1176-1, SUSE-SU-2018:1291-1, SUSE-SU-2018:1294-1, USN-3646-1, USN-3646-2, VIGILANCE-VUL-25994
OpenSLP: memory corruption via slpd_process.c
An attacker can generate a memory corruption via slpd_process.c of OpenSLP, in order to trigger a denial of service, and possibly to run code...
CVE-2017-17833, CVE-2018-12938-REJECT, DLA-1364-1, DLA-2025-1, DSA-2019-131, FEDORA-2018-05acd3c734, openSUSE-SU-2018:1958-1, openSUSE-SU-2018:2813-1, RHSA-2018:2240-01, RHSA-2018:2308-01, SUSE-SU-2018:1916-1, SUSE-SU-2018:1917-1, SUSE-SU-2018:2779-1, SUSE-SU-2018:2991-1, SUSE-SU-2018:2991-3, USN-3708-1, VIGILANCE-VUL-25987
Ghostscript: integer overflow via set_text_distance
An attacker can generate an integer overflow via set_text_distance() of Ghostscript, in order to trigger a denial of service, and possibly to run code...
bulletinapr2019, CVE-2018-10194, DLA-1363-1, FEDORA-2018-226dac231f, FEDORA-2018-3247413570, openSUSE-SU-2018:1348-1, openSUSE-SU-2018:1909-1, RHSA-2018:2918-01, SUSE-SU-2018:1332-1, SUSE-SU-2018:1369-1, SUSE-SU-2018:1884-1, USN-3636-1, VIGILANCE-VUL-25986
Our database contains other pages. You can request a free trial to read them.

Display information about RedHat Enterprise Linux: