A use-after-free flaw was found in the Linux kernels PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This ...
Continue ReadingAugust 29, 2022
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from so ...
Continue ReadingAugust 29, 2022
A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker ...
Continue ReadingAugust 29, 2022
A flaw was found in the Linux kernels io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.Read More ...
Continue ReadingAugust 29, 2022
There is a flaw in convert2rhel. convert2rhel passes the Red Hat account password to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the ...
Continue ReadingAugust 29, 2022
There is a flaw in convert2rhel. When the --activationkey option is used with convert2rhel, the activation key is subsequently passed to subscription-manager via the command line, which could allow un ...
Continue ReadingAugust 29, 2022
A flaw was found in python-oslo-utils. Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quo ...
Continue ReadingAugust 29, 2022
A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages tha ...
Continue ReadingAugust 29, 2022
Back to Main