Enterpriselinux
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Enterpriselinux product.
RSS Feeds for Enterpriselinux security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Enterpriselinux products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Enterpriselinux Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Enterpriselinux. Last year, in 2025 Enterpriselinux had 6 security vulnerabilities published. Right now, Enterpriselinux is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 6 | 7.70 |
It may take a day or so for new Enterpriselinux vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Enterpriselinux Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-9784 | Sep 02, 2025 |
Undertow DoS via MadeYouReset Server-Reset AbuseA flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS). |
|
| CVE-2025-8941 | Aug 13, 2025 |
Linux-PAM pam_namespace LPE via Symlink RaceA flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020. |
|
| CVE-2025-7425 | Jul 10, 2025 |
libxslt Heap Corruption via atype Flag ManipulationA flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption. |
And others... |
| CVE-2025-6020 | Jun 17, 2025 |
PAM Namespace Race: Local Priv Escal via Symlinks in linux-pamA flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions. |
|
| CVE-2025-6021 | Jun 12, 2025 |
Stack Overflow in libxml2 xmlBuildQName (CVE-2025-6021)A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. |
And others... |
| CVE-2025-5914 | Jun 09, 2025 |
Integer Overflow in libarchive RAR Reader Causes Double-FreeA vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition. |
And others... |