what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

CVE-2020-8945

Status Candidate

Overview

The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.

Related Files

Red Hat Security Advisory 2020-3167-01
Posted Jul 28, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3167-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 52d116c4473e321492aec7ee641e4724f3ac68dae2779f9227dc2b08d812e827
Red Hat Security Advisory 2020-2992-01
Posted Jul 28, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2992-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include memory exhaustion and use-after-free vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2019-14891, CVE-2020-10715, CVE-2020-7598, CVE-2020-8552, CVE-2020-8558, CVE-2020-8945
SHA-256 | 0f1b92f26088f8a28c8cf20ea0fc641bd642de6101793bbb755e413ca89ebc73
Red Hat Security Advisory 2020-2927-01
Posted Jul 21, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2927-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8558, CVE-2020-8945
SHA-256 | f833cbf21f4018b13911a2c7e99169453e01a49565c4e922d4f06ad75955a9bf
Red Hat Security Advisory 2020-2413-01
Posted Jul 13, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2413-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and use-after-free vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2019-11254, CVE-2020-8558, CVE-2020-8945
SHA-256 | 5d544c022de2ecf6c34347d8c6ff4a5d8dfd49991d401e2c84ff985d6e63b1a5
Red Hat Security Advisory 2020-2027-01
Posted May 13, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2027-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | b349ca2f8786f7a9700f174659bec340ca2f9021112a26ed41cec33d73b57829
Red Hat Security Advisory 2020-2117-01
Posted May 12, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2117-01 - The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Issues addressed include file overwrite and use-after-free vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2020-10696, CVE-2020-8945
SHA-256 | 5944b7f5075e90779cb4a1259685235624c7f4a0a9aef1002db944795d4e2225
Red Hat Security Advisory 2020-1940-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1940-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 5c8286026161834150bc224ae569c7f9918c61f720077ef24af660e965df2b83
Red Hat Security Advisory 2020-1937-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1937-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-1702, CVE-2020-8945
SHA-256 | 2d0f50b11ebb3854f22682e25046044243c2723e8d72c93194a4ce7e1900d354
Red Hat Security Advisory 2020-1402-01
Posted Apr 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1402-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 1e22008b12e80704db62e5267b68baf304ec238e95cb2a25b7c49653c482d5e9
Red Hat Security Advisory 2020-0934-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0934-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | ecfb54ae160def1b02693ff1eff80d1e6c5eba5018a485d375c916b96d05c808
Red Hat Security Advisory 2020-1231-01
Posted Apr 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1231-01 - The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point. Create an image, either from a working container or using the instructions in a Dockerfile. Build both Docker and OCI images. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 7b9a77f686d84e7088c39507d32078675c273e235145aff1afcb7f37bd50a3e0
Red Hat Security Advisory 2020-1230-01
Posted Apr 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1230-01 - The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 7a33ffac5c270d1956ea6c8a86596d6c3cfcb070986db7817ac68ea179ccc40b
Red Hat Security Advisory 2020-1234-01
Posted Apr 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1234-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. Issues addressed include bypass and use-after-free vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2019-16884, CVE-2020-1702, CVE-2020-8945
SHA-256 | d017e8d1a9c7a393806d36836f704685805fc6e7cc3db319a088bfb9ea16182f
Red Hat Security Advisory 2020-0863-01
Posted Mar 25, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0863-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | a6793c3c4c35b36e6be2d9063b23c55353aeb1ee1a495dbbfccff471e598fa0b
Red Hat Security Advisory 2020-0928-01
Posted Mar 24, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0928-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 57e0acbe0406b37e642279f30844fe9f9befb4f7f77aa3885e4ff28b7a169449
Red Hat Security Advisory 2020-0697-01
Posted Mar 13, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0697-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | 216264aa0c977f68ca4cb274db9fc432e23490e244ae8e433782c7270100436f
Red Hat Security Advisory 2020-0679-01
Posted Mar 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0679-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | bf058cc95f7e4304a5c0a2fb38682a875ebf957aa5dae2e75d55096c8b164b7d
Red Hat Security Advisory 2020-0689-01
Posted Mar 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0689-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | d213a91a33b2cab01020f00ae8f1a3ee4beb7f2a265216f47477eede1cc52d4d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close