The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of RedHat Enterprise Linux

Linux kernel: privilege escalation via KVM GDT.LIMIT
An attacker can bypass restrictions via KVM GDT.LIMIT of the Linux kernel, in order to escalate his privileges...
CERTFR-2018-AVI-386, cpuapr2019, cpujul2020, CVE-2018-10901, JSA10917, K07721343, RHSA-2018:2390-01, RHSA-2018:2391-01, RHSA-2018:2392-01, RHSA-2018:2393-01, RHSA-2018:2394-01, VIGILANCE-VUL-26861
libsndfile: buffer overflow via psf_memset
An attacker can generate a buffer overflow via psf_memset() of libsndfile, in order to trigger a denial of service, and possibly to run code...
397, bulletinoct2018, CVE-2018-13139, DLA-1618-1, openSUSE-SU-2018:2209-1, openSUSE-SU-2018:2214-1, RHSA-2020:1185-01, RHSA-2020:1636-01, SUSE-SU-2018:2065-1, SUSE-SU-2018:2074-1, USN-4013-1, USN-4704-1, VIGILANCE-VUL-26854
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
CERTFR-2018-AVI-359, CVE-2018-17461, CVE-2018-6044, CVE-2018-6150, CVE-2018-6151, CVE-2018-6152, CVE-2018-6153, CVE-2018-6154, CVE-2018-6155, CVE-2018-6157, CVE-2018-6158, CVE-2018-6159, CVE-2018-6160, CVE-2018-6161, CVE-2018-6162, CVE-2018-6163, CVE-2018-6164, CVE-2018-6165, CVE-2018-6166, CVE-2018-6167, CVE-2018-6168, CVE-2018-6169, CVE-2018-6170, CVE-2018-6171, CVE-2018-6172, CVE-2018-6173, CVE-2018-6174, CVE-2018-6175, CVE-2018-6176, CVE-2018-6177, CVE-2018-6178, CVE-2018-6179, DSA-4256-1, FEDORA-2018-499f2dbc96, openSUSE-SU-2018:2134-1, openSUSE-SU-2018:2135-1, RHSA-2018:2282-01, VIGILANCE-VUL-26842
Mailman: vulnerability via List Name Content Spoofing
A vulnerability via List Name Content Spoofing of Mailman was announced...
CVE-2018-13796, DLA-1442-1, DLA-1442-2, openSUSE-SU-2018:2309-1, RHSA-2020:1054-01, SUSE-SU-2018:4296-1, SUSE-SU-2019:13924-1, USN-4348-1, VIGILANCE-VUL-26828
Mutt: multiple vulnerabilities
An attacker can use several vulnerabilities of Mutt...
CVE-2018-14349, CVE-2018-14350, CVE-2018-14351, CVE-2018-14352, CVE-2018-14353, CVE-2018-14354, CVE-2018-14355, CVE-2018-14356, CVE-2018-14357, CVE-2018-14358, CVE-2018-14359, CVE-2018-14360, CVE-2018-14361, CVE-2018-14362, CVE-2018-14363, DLA-1455-1, DSA-4277-1, openSUSE-SU-2018:2212-1, openSUSE-SU-2019:0052-1, RHSA-2018:2526-01, RHSA-2020:1126-01, SUSE-SU-2018:2084-1, SUSE-SU-2018:2085-1, SUSE-SU-2018:2403-1, SUSE-SU-2019:1196-1, USN-3719-1, USN-3719-2, USN-3719-3, VIGILANCE-VUL-26822
Apache Tomcat: Man-in-the-Middle via WebSocket Client
An attacker can act as a Man-in-the-Middle via WebSocket Client on Apache Tomcat, in order to read or write data in the session...
CERTFR-2018-AVI-584, cpuoct2019, CVE-2018-8034, DLA-1453-1, DLA-1491-1, DSA-4281-1, FEDORA-2018-b1832101b8, HPESBUX04015, ibm10742719, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2019:0130-01, RHSA-2019:0131-01, RHSA-2019:0450-01, RHSA-2019:0451-01, RHSA-2019:1159-01, RHSA-2019:1160-01, RHSA-2019:1161-01, RHSA-2019:1162-01, RHSA-2019:1529-01, RHSA-2019:2205-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, SYMSA1463, USN-3723-1, VIGILANCE-VUL-26817
Apache Tomcat: information disclosure via User Sessions Reuse
An attacker can bypass access restrictions to data via User Sessions Reuse of Apache Tomcat, in order to obtain sensitive information...
CERTFR-2018-AVI-356, CERTFR-2018-AVI-584, CVE-2018-8037, DSA-4281-1, FEDORA-2018-b1832101b8, ibm10742719, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2018:2867-01, RHSA-2018:2868-01, RHSA-2019:1529-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3388-1, VIGILANCE-VUL-26816
Apache Tomcat: infinite loop via UTF-8 Decoder
An attacker can generate an infinite loop via UTF-8 Decoder of Apache Tomcat, in order to trigger a denial of service...
CERTFR-2018-AVI-356, CVE-2018-1336, DLA-1491-1, DSA-4281-1, HPESBUX04015, JSA10993, K73008537, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2018:2700-01, RHSA-2018:2701-01, RHSA-2018:2740-01, RHSA-2018:2741-01, RHSA-2018:2742-01, RHSA-2018:2743-01, RHSA-2018:2921-01, RHSA-2018:2930-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, SYMSA1463, USN-3723-1, VIGILANCE-VUL-26815
libxml2: NULL pointer dereference via xpath.c-xmlXPathCompOpEval
An attacker can force a NULL pointer to be dereferenced via xpath.c:xmlXPathCompOpEval() of libxml2, in order to trigger a denial of service...
901817, bulletinapr2019, CVE-2018-14404, DLA-1524-1, DLA-2369-1, DSA-2020-030, DSA-2020-289, openSUSE-SU-2018:3107-1, openSUSE-SU-2018:3110-1, openSUSE-SU-2019:0185-1, RHSA-2020:1190-01, RHSA-2020:1827-01, SSB-439005, SUSE-SU-2018:3080-1, SUSE-SU-2018:3081-1, SUSE-SU-2019:0272-1, SUSE-SU-2019:13985-1, USN-3739-1, USN-3739-2, VIGILANCE-VUL-26812
Mercurial: integer overflow via mpatch.c
An attacker can generate an integer overflow via mpatch.c of Mercurial, in order to trigger a denial of service, and possibly to run code...
CVE-2018-13347, DLA-2293-1, openSUSE-SU-2018:2023-1, openSUSE-SU-2018:2132-1, RHSA-2019:2276-01, SUSE-SU-2018:1990-1, SUSE-SU-2018:1996-1, SUSE-SU-2018:1998-1, VIGILANCE-VUL-26806
Our database contains other pages. You can request a free trial to read them.

Display information about RedHat Enterprise Linux: