Codeready Linux Builder Ibm Z Systems Red Hat Codeready Linux Builder Ibm Z Systems

Do you want an email whenever new security vulnerabilities are reported in Red Hat Codeready Linux Builder Ibm Z Systems?

By the Year

In 2022 there have been 2 vulnerabilities in Red Hat Codeready Linux Builder Ibm Z Systems with an average score of 7.0 out of ten. Last year Codeready Linux Builder Ibm Z Systems had 1 security vulnerability published. That is, 1 more vulnerability have already been reported in 2022 as compared to last year. However, the average CVE base score of the vulnerabilities in 2022 is greater by 1.50.

Year Vulnerabilities Average Score
2022 2 7.00
2021 1 5.50
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Codeready Linux Builder Ibm Z Systems vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Codeready Linux Builder Ibm Z Systems Security Vulnerabilities

A flaw was found in python

CVE-2021-3737 7.5 - High - March 04, 2022

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

Resource Exhaustion

An off-by-one error was found in the SCSI device emulation in QEMU

CVE-2021-3930 6.5 - Medium - February 18, 2022

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

off-by-five

There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0

CVE-2020-27842 5.5 - Medium - January 05, 2021

There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability.

Out-of-bounds Read

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Fedora Project Extra Packages Enterprise Linux or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe