Red Hat Migration Toolkit
Recent Red Hat Migration Toolkit Security Advisories
Advisory | Title | Published |
---|---|---|
RHSA-2024:1433 | (RHSA-2024:1433) Moderate: Migration Toolkit for Applications security and bug fix update | March 20, 2024 |
RHSA-2024:1027 | (RHSA-2024:1027) Moderate: Migration Toolkit for Applications security update | February 28, 2024 |
RHSA-2024:0720 | (RHSA-2024:0720) Moderate: Migration Toolkit for Runtimes security, bug fix and enhancement update | February 7, 2024 |
RHSA-2024:0719 | (RHSA-2024:0719) Moderate: Migration Toolkit for Runtimes security, bug fix and enhancement update | February 7, 2024 |
RHSA-2023:7670 | (RHSA-2023:7670) Moderate: Migration Toolkit for Runtimes bug fix, enhancement and security update | December 6, 2023 |
RHSA-2023:7222 | (RHSA-2023:7222) Moderate: Migration Toolkit for Containers (MTC) 1.8.2 security and bug fix update | November 15, 2023 |
RHSA-2023:6305 | (RHSA-2023:6305) Important: Migration Toolkit for Applications security update | November 6, 2023 |
RHSA-2023:6280 | (RHSA-2023:6280) Important: Migration Toolkit for Applications security and bug fix update | November 2, 2023 |
RHSA-2023:6161 | (RHSA-2023:6161) Important: Migration Toolkit for Containers (MTC) 1.7.14 security and bug fix update | October 30, 2023 |
RHSA-2023:6138 | (RHSA-2023:6138) Important: Migration Toolkit for Runtimes security update | October 26, 2023 |
By the Year
In 2024 there have been 0 vulnerabilities in Red Hat Migration Toolkit . Migration Toolkit did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 1 | 6.30 |
2021 | 0 | 0.00 |
2020 | 1 | 7.80 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Migration Toolkit vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Migration Toolkit Security Vulnerabilities
An incorrect default permissions vulnerability was found in the mig-controller
CVE-2021-3948
6.3 - Medium
- February 18, 2022
An incorrect default permissions vulnerability was found in the mig-controller. Due to an incorrect cluster namespaces handling an attacker may be able to migrate a malicious workload to the target cluster, impacting confidentiality, integrity, and availability of the services located on that cluster.
Incorrect Default Permissions
A heap use-after-free vulnerability was found in systemd before version v245-rc1
CVE-2020-1712
7.8 - High
- March 31, 2020
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
Dangling pointer
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Debian Linux or by Red Hat? Click the Watch button to subscribe.