Messaging Realtime Grid Red Hat Messaging Realtime Grid

stack.watch can notify you when security vulnerabilities are reported in Red Hat Messaging Realtime Grid. You can add multiple products that you use with Messaging Realtime Grid to create your own personal software stack watcher.

By the Year

In 2020 there have been 1 vulnerability in Red Hat Messaging Realtime Grid with an average score of 5.9 out of ten. Last year Messaging Realtime Grid had 2 security vulnerabilities published. Right now, Messaging Realtime Grid is on track to have less security vulerabilities in 2020 than it did last year. Last year, the average CVE base score was greater by 1.90

Year Vulnerabilities Average Score
2020 1 5.90
2019 2 7.80
2018 0 0.00

It may take a day or so for new Messaging Realtime Grid vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.

Latest Red Hat Messaging Realtime Grid Security Vulnerabilities

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7

CVE-2020-10711 5.9 - Medium - May 22, 2020

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.

NULL Pointer Dereference

There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that

CVE-2019-14814 7.8 - High - September 20, 2019

There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.

buffer overrun

There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that

CVE-2019-14816 7.8 - High - September 20, 2019

There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.

buffer overrun