Red Hat Red Hat Linux OS and other open source products

Do you want an email whenever new security vulnerabilities are reported in any Red Hat product?

Products by Red Hat Sorted by Most Security Vulnerabilities since 2018

Red Hat Enterprise Linux Server1259 vulnerabilities
RedHat Enterprise Linux (RHEL) Server. Includes software bundeled with RHEL server.

Red Hat Enterprise Linux Workstation1238 vulnerabilities
RedHat Enterprise Linux (RHEL) Workstation. Includes software bundled with RHEL Workstation.

Red Hat Enterprise Linux Desktop1218 vulnerabilities
RedHat Enterprise Linux (RHEL) Desktop. Includes software bundled with RHEL desktop

Red Hat Enterprise Linux (RHEL)760 vulnerabilities

Red Hat Enterprise Linux Eus497 vulnerabilities

Red Hat Openstack156 vulnerabilities

Red Hat Satellite127 vulnerabilities

Red Hat Virtualization105 vulnerabilities

Red Hat Enterprise Mrg69 vulnerabilities

Red Hat Single Sign On68 vulnerabilities

Red Hat Ansible Tower65 vulnerabilities

Red Hat Keycloak60 vulnerabilities

Red Hat Virtualization Host51 vulnerabilities

Red Hat Linux Server45 vulnerabilities

Red Hat Linux Desktop45 vulnerabilities

Red Hat Linux Workstation45 vulnerabilities

Red Hat Openshift38 vulnerabilities

Red Hat Ceph Storage37 vulnerabilities

Red Hat Enterprise Linux Aus33 vulnerabilities

Red Hat Software Collections32 vulnerabilities

Red Hat Jboss Fuse27 vulnerabilities

Red Hat Ansible26 vulnerabilities

Red Hat Ansible Engine26 vulnerabilities

Red Hat Linux25 vulnerabilities

Red Hat Libvirt23 vulnerabilities

Red Hat Undertow22 vulnerabilities
Java HTTP Server and Servlet Container

Red Hat Cloudforms21 vulnerabilities

Red Hat Storage20 vulnerabilities

Red Hat Openstack Platform20 vulnerabilities

Red Hat Jboss Data Grid18 vulnerabilities

Red Hat Gluster Storage17 vulnerabilities

Red Hat Quay17 vulnerabilities

Red Hat Openshift Service Mesh17 vulnerabilities

Red Hat Fuse16 vulnerabilities

Red Hat Wildfly16 vulnerabilities

Red Hat Jboss Core Services16 vulnerabilities

Red Hat Enterprise Linux Tus14 vulnerabilities

Red Hat Process Automation14 vulnerabilities

Red Hat Decision Manager13 vulnerabilities

Red Hat Integration Camel K12 vulnerabilities

Red Hat Developer Tools12 vulnerabilities

Red Hat Virtualization Manager11 vulnerabilities

Red Hat Ceph11 vulnerabilities

Red Hat Build Of Quarkus9 vulnerabilities

Red Hat Descision Manager9 vulnerabilities

Red Hat Satellite Capsule8 vulnerabilities

Red Hat Spacewalk Java8 vulnerabilities

Red Hat Resteasy8 vulnerabilities

Red Hat 3scale7 vulnerabilities

Red Hat Jboss A Mq7 vulnerabilities

Red Hat Data Grid7 vulnerabilities

Red Hat Jboss Brms6 vulnerabilities

Red Hat Mrg Realtime6 vulnerabilities

Red Hat Certification6 vulnerabilities

Red Hat Amq5 vulnerabilities

Red Hat Automation Manager5 vulnerabilities

Red Hat Jboss Bpm Suite5 vulnerabilities

Red Hat Spacewalk5 vulnerabilities

Red Hat Etcd5 vulnerabilities

Red Hat Certificate System4 vulnerabilities

Red Hat Codeready Studio4 vulnerabilities

Red Hat Directory Server4 vulnerabilities

Recent Red Hat Security Advisories

Advisory Title Published
RHSA-2022:6764 (RHSA-2022:6764) Important: bind security update October 3, 2022
RHSA-2022:6763 (RHSA-2022:6763) Important: bind security update October 3, 2022
RHSA-2022:6756 (RHSA-2022:6756) Moderate: java-1.8.0-ibm security update September 29, 2022
RHSA-2022:6755 (RHSA-2022:6755) Moderate: java-1.7.1-ibm security update September 29, 2022
RHSA-2022:6753 (RHSA-2022:6753) Moderate: httpd24-httpd security and bug fix update September 29, 2022
RHSA-2022:6750 (RHSA-2022:6750) Important: Red Hat OpenStack Platform (openstack-barbican) security update September 29, 2022
RHSA-2022:6741 (RHSA-2022:6741) Important: kernel security and bug fix update September 28, 2022
RHSA-2022:6717 (RHSA-2022:6717) Important: thunderbird security update September 26, 2022
RHSA-2022:6716 (RHSA-2022:6716) Important: thunderbird security update September 26, 2022
RHSA-2022:6715 (RHSA-2022:6715) Important: thunderbird security update September 26, 2022

@RedHat Tweets

#RedHat's @kernelcdub has been recognized by @InformaTechHQ as a #NetworkX50 top influencer in the #telco space. Ch… https://t.co/aWSJDhEYnG
Mon Oct 03 19:00:10 +0000 2022

RT @sjvn: Red Hat OpenStack Platform 17 arrives https://t.co/sdUkPadpoe via @ZDNET & @sjvn @RedHat might have named their @OpenStack #cl…
Mon Oct 03 16:15:35 +0000 2022

#AnsibleFest is about connection. Community. Imagination. Are you joining us Oct. 18-19 in Chicago?… https://t.co/cWsm2sP8Jk
Mon Oct 03 15:13:03 +0000 2022

RT @Lopez: Thread you say? :) �� 5 @ansible sessions that will change how you automate: #AnsibleFest
Mon Oct 03 14:09:01 +0000 2022

Discover how @Turkcell takes advantage of new AI-powered revenue opportunities with a self-service application foun… https://t.co/ymUBMdSFVo
Sat Oct 01 17:48:01 +0000 2022

By the Year

In 2022 there have been 744 vulnerabilities in Red Hat with an average score of 6.9 out of ten. Last year Red Hat had 1061 security vulnerabilities published. Right now, Red Hat is on track to have less security vulnerabilities in 2022 than it did last year. However, the average CVE base score of the vulnerabilities in 2022 is greater by 0.21.

Year Vulnerabilities Average Score
2022 744 6.88
2021 1061 6.68
2020 602 6.52
2019 570 7.16
2018 644 7.31

It may take a day or so for new Red Hat vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Security Vulnerabilities

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots

CVE-2014-0147 6.2 - Medium - September 29, 2022

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

Integer Overflow or Wraparound

QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could

CVE-2014-0144 8.6 - High - September 29, 2022

QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.

Improper Input Validation

Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries

CVE-2014-0148 5.5 - Medium - September 29, 2022

Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.

Infinite Loop

IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which

CVE-2015-1931 5.5 - Medium - September 29, 2022

IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.

Cleartext Storage of Sensitive Information

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak

CVE-2022-38178 7.5 - High - September 21, 2022

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

Improper Verification of Cryptographic Signature

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak

CVE-2022-38177 7.5 - High - September 21, 2022

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

Improper Verification of Cryptographic Signature

By sending specific queries to the resolver, an attacker

CVE-2022-3080 7.5 - High - September 21, 2022

By sending specific queries to the resolver, an attacker can cause named to crash.

Injection

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak

CVE-2022-38178 7.5 - High - September 21, 2022

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

Improper Verification of Cryptographic Signature

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak

CVE-2022-38177 7.5 - High - September 21, 2022

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

Improper Verification of Cryptographic Signature

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms

CVE-2022-1798 6.5 - Medium - September 15, 2022

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.

Directory traversal

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms

CVE-2022-1798 6.5 - Medium - September 15, 2022

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.

Directory traversal

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms

CVE-2022-1798 6.5 - Medium - September 15, 2022

A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.

Directory traversal

An XSS exists in automation controller UI where the project name is susceptible to XSS injection

CVE-2022-3205 6.1 - Medium - September 13, 2022

An XSS exists in automation controller UI where the project name is susceptible to XSS injection

XSS

.NET Core and Visual Studio Denial of Service Vulnerability.

CVE-2022-38013 7.5 - High - September 13, 2022

.NET Core and Visual Studio Denial of Service Vulnerability.

.NET Core and Visual Studio Denial of Service Vulnerability.

CVE-2022-38013 7.5 - High - September 13, 2022

.NET Core and Visual Studio Denial of Service Vulnerability.

.NET Core and Visual Studio Denial of Service Vulnerability.

CVE-2022-38013 7.5 - High - September 13, 2022

.NET Core and Visual Studio Denial of Service Vulnerability.

.NET Core and Visual Studio Denial of Service Vulnerability.

CVE-2022-38013 7.5 - High - September 13, 2022

.NET Core and Visual Studio Denial of Service Vulnerability.

.NET Core and Visual Studio Denial of Service Vulnerability.

CVE-2022-38013 7.5 - High - September 13, 2022

.NET Core and Visual Studio Denial of Service Vulnerability.

An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in

CVE-2022-2989 7.1 - High - September 13, 2022

An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

AuthZ

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in

CVE-2022-2990 7.1 - High - September 13, 2022

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

AuthZ

A flaw was found in WildFly, where an attacker

CVE-2022-1278 7.5 - High - September 13, 2022

A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.

Insecure Default Initialization of Resource

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map

CVE-2022-2905 5.5 - Medium - September 09, 2022

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

Out-of-bounds Read

A flaw was found in the Linux kernels driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices

CVE-2022-2964 7.8 - High - September 09, 2022

A flaw was found in the Linux kernels driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.

Memory Corruption

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A use-after-free vulnerability was found in systemd

CVE-2022-2526 9.8 - Critical - September 09, 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Dangling pointer

A flaw was found in python

CVE-2020-10735 7.5 - High - September 09, 2022

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

Incorrect Type Conversion or Cast

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules

CVE-2022-36067 10 - Critical - September 06, 2022

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

Improper Control of Dynamically-Managed Code Resources

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules

CVE-2022-36067 10 - Critical - September 06, 2022

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

Improper Control of Dynamically-Managed Code Resources

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules

CVE-2022-36067 10 - Critical - September 06, 2022

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

Improper Control of Dynamically-Managed Code Resources

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules

CVE-2022-36067 10 - Critical - September 06, 2022

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

Improper Control of Dynamically-Managed Code Resources

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules

CVE-2022-36067 10 - Critical - September 06, 2022

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

Improper Control of Dynamically-Managed Code Resources

A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file

CVE-2022-25310 5.5 - Medium - September 06, 2022

A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file

CVE-2022-25309 5.5 - Medium - September 06, 2022

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

Memory Corruption

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

A stack-based buffer overflow flaw was found in the Fribidi package

CVE-2022-25308 7.8 - High - September 06, 2022

A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.

Memory Corruption

A vulnerability was found in the PCS project

CVE-2022-2735 7.8 - High - September 06, 2022

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

Incorrect Default Permissions

A vulnerability was found in the PCS project

CVE-2022-2735 7.8 - High - September 06, 2022

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

Incorrect Default Permissions

A vulnerability was found in the PCS project

CVE-2022-2735 7.8 - High - September 06, 2022

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

Incorrect Default Permissions

A vulnerability was found in the PCS project

CVE-2022-2735 7.8 - High - September 06, 2022

A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.

Incorrect Default Permissions

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

An authorization flaw was found in openstack-barbican

CVE-2022-23451 8.1 - High - September 06, 2022

An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of service by consuming protected resources.

AuthZ

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto

CVE-2021-43565 7.5 - High - September 06, 2022

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered

CVE-2022-2806 5.5 - Medium - September 01, 2022

It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev

An Improper Certificate Validation attack was found in Openshift

CVE-2022-1632 6.5 - Medium - September 01, 2022

An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.

Improper Certificate Validation

A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend

CVE-2022-2238 6.5 - Medium - September 01, 2022

A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting.

SQL Injection

A flaw was found in Keystone

CVE-2022-2447 6.6 - Medium - September 01, 2022

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.

Operation on a Resource after Expiration or Release

An integer coercion error was found in the openvswitch kernel module

CVE-2022-2639 7.8 - High - September 01, 2022

An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Memory Corruption

A flaw was found in Undertow

CVE-2022-2764 4.9 - Medium - September 01, 2022

A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.

A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7

CVE-2022-2256 5.4 - Medium - September 01, 2022

A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.

XSS

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

The version of podman as released for Red Hat Enterprise Linux 7 Extras

CVE-2022-2739 5.3 - Medium - September 01, 2022

The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-14370, which was previously fixed via RHSA-2020:5056. This issue could possibly allow an attacker to gain access to sensitive information stored in environment variables.

The version of podman as released for Red Hat Enterprise Linux 7 Extras

CVE-2022-2738 8.1 - High - September 01, 2022

The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-8945, which was previously fixed via RHSA-2020:2117. This issue could possibly be used to crash or cause potential code execution in Go applications that use the Go GPGME wrapper library, under certain conditions, during GPG signature verification.

Dangling pointer

A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes

CVE-2022-1902 8.8 - High - September 01, 2022

A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. Notifier secrets were not properly sanitized in the GraphQL API. This flaw allows authenticated ACS users to retrieve Notifiers from the GraphQL API, revealing secrets that can escalate their privileges.

Exposure of Resource to Wrong Sphere

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A credentials leak was found in the OpenShift Container Platform

CVE-2022-2403 6.5 - Medium - September 01, 2022

A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-config-managed namespace, compromising any web traffic secured using that certificate.

Exposure of Resource to Wrong Sphere

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges

CVE-2022-1729 7 - High - September 01, 2022

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Race Condition

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.