Red Hat Security Advisory 2024-0252-03 - An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include bypass and cross site request forgery vulnerabilities.
d61da2c121b751ae21f9658eb6dd9d4e748b91cf53d65ff7171ed809205f5b3c
Red Hat Security Advisory 2024-0143-03 - An update for the idm:DL1 module is now available for Red Hat Enterprise Linux 8. Issues addressed include bypass and cross site request forgery vulnerabilities.
ed263fcd00e905feb0d56ab66b6da8c898926128807cd8730d82916278431d2d
Red Hat Security Advisory 2024-0139-03 - An update for the idm:DL1 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include bypass and cross site request forgery vulnerabilities.
1c21a180228e33f381c5bb56dd3154778ba4bc784b1c29509eaacb59f1155d64
Red Hat Security Advisory 2024-0137-03 - An update for the idm:DL1 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include bypass and cross site request forgery vulnerabilities.
02af0441807d42c48dd626579074780a566e0ebf93b49489088105f90f69b4a5
Gentoo Linux Security Advisory 202309-6 - Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution. Versions greater than or equal to 4.18.4 are affected.
6a49581d3fdfb4a2202121f6c5b6544b859edc2a8b279089f9dbccf4ce66b153
Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.
80569651d5cc8033bbdb7f6416fafc8f5509382decbdaab9937ba65ff11a16de
Red Hat Security Advisory 2023-2570-01 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center. Issues addressed include bypass and double free vulnerabilities.
d7f905ae4ee440bae464a26e86acadae1d7eba9c076e3793d5eeb8825d328465