what you don't know can hurt you
Showing 101 - 125 of 42,105 RSS Feed

Operating System: Linux

Red Hat Security Advisory 2022-1920-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1920-01 - Scalable Vector Graphics is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Issues addressed include denial of service and out of bounds write vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2021-45930
SHA-256 | 511c7ab71b2ab1635ada0e462256ad0a1cca32f3ca1855347c72fa1b10c0ce94
Red Hat Security Advisory 2022-1898-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1898-01 - Fapolicyd implements application whitelisting to decide file access rights. Applications that are known via a reputation source are allowed access while unknown applications are not. The daemon makes use of the kernel's fanotify interface to determine file access rights.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2022-1117
SHA-256 | a252bd45c61063768ab945b7836fb27e06018af31f730c386bdbc8dcc9a9b38f
Red Hat Security Advisory 2022-1894-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1894-01 - Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-21658
SHA-256 | 370f6f58d1c8893b9d12253585c41152d459bc9bff16102ad7407e74f2a00f48
Red Hat Security Advisory 2022-1860-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1860-01 - Maven is a software project management and comprehension tool. Based on the concept of a project object model, Maven can manage a project's build, reporting and documentation from a central piece of information.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-13956
SHA-256 | 3239befea7b91666f485804919d12cde6e538daab8845b6a2dc1641c6371518f
Red Hat Security Advisory 2022-2081-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-2081-01 - The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts, and pcmcia configuration files. Issues addressed include a memory leak vulnerability.

tags | advisory, memory leak
systems | linux, redhat
advisories | CVE-2021-41229
SHA-256 | 43cd87049ad5987854e8535a156c5e89647f968f477c51d91d927c78e5fd3e60
Red Hat Security Advisory 2022-2031-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-2031-01 - libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2021-3634
SHA-256 | 99f67d3e5873587a717a66b1ddacad59122c8692e3fefaf1169520a8c0bbacd6
Red Hat Security Advisory 2022-1851-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1851-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System. Issues addressed include a memory leak vulnerability.

tags | advisory, memory leak
systems | linux, redhat
advisories | CVE-2021-4213
SHA-256 | 2324d9e37f35a58b59282b367250dc1c5d6f823c1ead4892ee10af453d212d56
Red Hat Security Advisory 2022-2013-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-2013-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Issues addressed include a privilege escalation vulnerability.

tags | advisory, protocol
systems | linux, redhat, unix
advisories | CVE-2021-41617
SHA-256 | 13bc1420d8a6b3ab9e7cc3edb50bece9071c44dfad388f8f4a9f1a3ec25f6121
Red Hat Security Advisory 2022-1842-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1842-01 - Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-18898
SHA-256 | ccb8d5c192208c14df34a946a5d2b12b7fb96142f3e49bfc870fdecd3d096ed7
Red Hat Security Advisory 2022-1766-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1766-01 - LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-25633, CVE-2021-25634, CVE-2021-25635
SHA-256 | 5b846c221d454c90b54c27181222908dd32fca2b480faa78ffd9087c0eef3083
Red Hat Security Advisory 2022-1830-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1830-01 - PostgreSQL is an advanced object-relational database management system. Issues addressed include a man-in-the-middle vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-23214
SHA-256 | 16f9b2a051d1a45a9a7701025668007af70d683f92879c34e2d1950f3fb559dd
Red Hat Security Advisory 2022-1796-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1796-01 - Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Issues addressed include an out of bounds write vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-38593
SHA-256 | 5f970f04fcced1e7338521d788189a47f4f6f5a597aea6533136c6236b1bfd4b
Red Hat Security Advisory 2022-1991-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1991-01 - The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Issues addressed include integer overflow and out of bounds write vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2021-38185
SHA-256 | 24a0cf7784baf59e62fa1e4f391e96a61f3b8c3c80212b5da1fd9457fef97e39
Red Hat Security Advisory 2022-1823-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1823-01 - The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Issues addressed include cross site scripting and open redirection vulnerabilities.

tags | advisory, web, vulnerability, xss
systems | linux, redhat
advisories | CVE-2021-32786, CVE-2021-32791, CVE-2021-32792, CVE-2021-39191
SHA-256 | f239b6509c167d4f0fb694e9c49ad2a7197e2d9f0765f51fcc0f6869179992dc
Red Hat Security Advisory 2022-1814-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1814-01 - GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts.

tags | advisory, shell
systems | linux, redhat, windows
advisories | CVE-2020-17489
SHA-256 | 6aef6e9677cf9c1bb55c80d3c53876b94f7260847d6381d799556ac3d7ca711a
Red Hat Security Advisory 2022-1797-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1797-01 - Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-18898
SHA-256 | 90830d1d7e9d6ddcd3357ae70b66cb6537422d78fa8c9bd814b168cec88ffccc
Red Hat Security Advisory 2022-1821-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1821-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, python
systems | linux, redhat
advisories | CVE-2021-3733, CVE-2021-3737, CVE-2021-4189, CVE-2021-43818, CVE-2022-0391
SHA-256 | 7f5d07cb76947dd97d0ef4499761f3a21f5ac6ce8b664d628ff9051f4d8f3ad5
Red Hat Security Advisory 2022-1819-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1819-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Issues addressed include a memory exhaustion vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-38297, CVE-2021-39293, CVE-2021-41771, CVE-2021-41772, CVE-2022-23772, CVE-2022-23773, CVE-2022-23806
SHA-256 | 0cef4f3cb238b44324063cb73b26ab3a647c83018d6eeb756322cd435509f3e0
Red Hat Security Advisory 2022-1777-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1777-01 - WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Issues addressed include buffer overflow, bypass, code execution, cross site scripting, information leakage, out of bounds read, and use-after-free vulnerabilities.

tags | advisory, web, overflow, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2021-30809, CVE-2021-30818, CVE-2021-30823, CVE-2021-30836, CVE-2021-30846, CVE-2021-30848, CVE-2021-30849, CVE-2021-30851, CVE-2021-30884, CVE-2021-30887, CVE-2021-30888, CVE-2021-30889, CVE-2021-30890, CVE-2021-30897, CVE-2021-30934, CVE-2021-30936, CVE-2021-30951, CVE-2021-30952, CVE-2021-30953, CVE-2021-30954, CVE-2021-30984, CVE-2021-45481, CVE-2021-45482, CVE-2021-45483, CVE-2022-22589, CVE-2022-22590
SHA-256 | 1b42edcf15bc395449a2f06f7c24ba1c5002c9b86ced5974af0fc8fe1f4ffeb1
Red Hat Security Advisory 2022-1801-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1801-01 - GLib/GObject wrapper for the Facebook Graph API that integrates with GNOME Online Accounts.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-39358
SHA-256 | dfbb2c2ef602b3e33b7e4d4c360d7ae1483a796ca462df625e91dd4f30d52d1a
Red Hat Security Advisory 2022-1781-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1781-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Issues addressed include a traversal vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-43813
SHA-256 | c386450a163d13ce56c292e4f66238308d45cd07817f61470be0354dc3b6a339
Red Hat Security Advisory 2022-2129-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-2129-01 - Lynx is a text-based Web browser. Lynx does not display any images, but it does support frames, tables, and most other HTML tags.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-38165
SHA-256 | 7d6c181d1085e5ee4ea8076cb81e8ddf0b0c8c7f984235b458bd68c9f4697be8
Red Hat Security Advisory 2022-1820-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1820-01 - The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2021-3802
SHA-256 | 71b0f576fca9c122c1c4120a83b31bc12423b0f8ec684b4a05489aabedb142d3
Red Hat Security Advisory 2022-1762-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1762-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include denial of service and privilege escalation vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2022-1227, CVE-2022-21698, CVE-2022-27649, CVE-2022-27650, CVE-2022-27651
SHA-256 | bde6afbb4d12b125caf149c631cda19348fd208d14f9c0bc796870a928ad56cc
Red Hat Security Advisory 2022-1808-01
Posted May 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1808-01 - GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2019-25051
SHA-256 | c99b19ffd02de82a92a5fd528999f602f4797e92e3e2d9c8ada270ebc0472c80
Page 5 of 1,685
Back34567Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close