Product:

Enterprise_linux_server_eus

(Redhat)
Date ID Summary Products Score Patch
2019-11-14 CVE-2019-0155 Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before... Atom_x5\-E3930_firmware, Atom_x5\-E3940_firmware, Atom_x7\-E3950_firmware, Celeron_g3900_firmware, Celeron_g3900e_firmware, Celeron_g3900t_firmware, Celeron_g3900te_firmware, Celeron_g3902e_firmware, Celeron_g3920_firmware, Celeron_g3930_firmware, Celeron_g3930e_firmware, Celeron_g3930t_firmware, Celeron_g3930te_firmware, Celeron_g3950_firmware, Celeron_g4900_firmware, Celeron_g4900t_firmware, Celeron_g4920_firmware, Celeron_g4930_firmware, Celeron_g4930e_firmware, Celeron_g4930t_firmware, Celeron_g4932e_firmware, Celeron_g4950_firmware, Celeron_j1750_firmware, Celeron_j1800_firmware, Celeron_j1850_firmware, Celeron_j1900_firmware, Celeron_j3060_firmware, Celeron_j3160_firmware, Celeron_j3355_firmware, Celeron_j3355e_firmware, Celeron_j3455_firmware, Celeron_j4005_firmware, Celeron_j4025_firmware, Celeron_j4105_firmware, Celeron_j4125_firmware, Celeron_n2805_firmware, Celeron_n2806_firmware, Celeron_n2807_firmware, Celeron_n2808_firmware, Celeron_n2810_firmware, Celeron_n2815_firmware, Celeron_n2820_firmware, Celeron_n2830_firmware, Celeron_n2840_firmware, Celeron_n2910_firmware, Celeron_n2920_firmware, Celeron_n2930_firmware, Celeron_n2940_firmware, Celeron_n3000_firmware, Celeron_n3010_firmware, Celeron_n3050_firmware, Celeron_n3060_firmware, Celeron_n3150_firmware, Celeron_n3160_firmware, Celeron_n3350_firmware, Celeron_n3350e_firmware, Celeron_n3450_firmware, Celeron_n4000_firmware, Celeron_n4020_firmware, Celeron_n4100_firmware, Celeron_n4120_firmware, Core_i3\-1005g1_firmware, Core_i3\-10110u_firmware, Core_i3\-10110y_firmware, Core_i3\-5005u_firmware, Core_i3\-5010u_firmware, Core_i3\-5015u_firmware, Core_i3\-5020u_firmware, Core_i3\-5157u_firmware, Core_i3\-6100_firmware, Core_i3\-6100h_firmware, Core_i3\-6100u_firmware, Core_i3\-6167u_firmware, Core_i3\-7100_firmware, Core_i3\-7100h_firmware, Core_i3\-7100t_firmware, Core_i3\-7100u_firmware, Core_i3\-7167u_firmware, Core_i3\-7300_firmware, Core_i3\-7300t_firmware, Core_i3\-7320_firmware, Core_i3\-7350k_firmware, Core_i3\-8100_firmware, Core_i3\-8100t_firmware, Core_i3\-8109u_firmware, Core_i3\-8145u_firmware, Core_i3\-8300_firmware, Core_i3\-8300t_firmware, Core_i3\-8350k_firmware, Core_i3\-9100_firmware, Core_i3\-9100t_firmware, Core_i3\-9130u_firmware, Core_i3\-9300_firmware, Core_i3\-9300t_firmware, Core_i3\-9320_firmware, Core_i3\-9350k_firmware, Core_i5\+8400_firmware, Core_i5\+8500_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-5200u_firmware, Core_i5\-5250u_firmware, Core_i5\-5257u_firmware, Core_i5\-5287u_firmware, Core_i5\-5300u_firmware, Core_i5\-5350h_firmware, Core_i5\-5350u_firmware, Core_i5\-6200u_firmware, Core_i5\-6260u_firmware, Core_i5\-6267u_firmware, Core_i5\-6287u_firmware, Core_i5\-6300hq_firmware, Core_i5\-6300u_firmware, Core_i5\-6350hq_firmware, Core_i5\-6360u_firmware, Core_i5\-6440hq_firmware, Core_i5\-6500_firmware, Core_i5\-7200u_firmware, Core_i5\-7260u_firmware, Core_i5\-7267u_firmware, Core_i5\-7287u_firmware, Core_i5\-7300hq_firmware, Core_i5\-7300u_firmware, Core_i5\-7360u_firmware, Core_i5\-7400_firmware, Core_i5\-7400t_firmware, Core_i5\-7440hq_firmware, Core_i5\-7500_firmware, Core_i5\-7500t_firmware, Core_i5\-7600_firmware, Core_i5\-7600k_firmware, Core_i5\-7600t_firmware, Core_i5\-7y54_firmware, Core_i5\-7y57_firmware, Core_i5\-8200y_firmware, Core_i5\-8250u_firmware, Core_i5\-8259u_firmware, Core_i5\-8265u_firmware, Core_i5\-8269u_firmware, Core_i5\-8300h_firmware, Core_i5\-8305g_firmware, Core_i5\-8350u_firmware, Core_i5\-8365u_firmware, Core_i5\-8400_firmware, Core_i5\-8400b_firmware, Core_i5\-8400h_firmware, Core_i5\-8400t_firmware, Core_i5\-8500_firmware, Core_i5\-8500b_firmware, Core_i5\-8500t_firmware, Core_i5\-8600_firmware, Core_i5\-8600k_firmware, Core_i5\-8600t_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400h_firmware, Core_i5\-9400t_firmware, Core_i5\-9500_firmware, Core_i5\-9500t_firmware, Core_i5\-9600_firmware, Core_i5\-9600k_firmware, Core_i5\-9600t_firmware, Core_i7\+8700_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-5500u_firmware, Core_i7\-5550u_firmware, Core_i7\-5557u_firmware, Core_i7\-5600u_firmware, Core_i7\-5650u_firmware, Core_i7\-5700hq_firmware, Core_i7\-5750hq_firmware, Core_i7\-5775c_firmware, Core_i7\-5850hq_firmware, Core_i7\-5950hq_firmware, Core_i7\-6500u_firmware, Core_i7\-6560u_firmware, Core_i7\-6567u_firmware, Core_i7\-6600u_firmware, Core_i7\-6650u_firmware, Core_i7\-6660u_firmware, Core_i7\-6700_firmware, Core_i7\-6700hq_firmware, Core_i7\-6700t_firmware, Core_i7\-6700te_firmware, Core_i7\-6770hq_firmware, Core_i7\-6820hk_firmware, Core_i7\-6820hq_firmware, Core_i7\-6870hq_firmware, Core_i7\-6920hq_firmware, Core_i7\-6970hq_firmware, Core_i7\-7500u_firmware, Core_i7\-7560u_firmware, Core_i7\-7567u_firmware, Core_i7\-7600u_firmware, Core_i7\-7660u_firmware, Core_i7\-7700_firmware, Core_i7\-7700hq_firmware, Core_i7\-7700k_firmware, Core_i7\-7700t_firmware, Core_i7\-7800x_firmware, Core_i7\-7820hk_firmware, Core_i7\-7820hq_firmware, Core_i7\-7820x_firmware, Core_i7\-7920hq_firmware, Core_i7\-7y75_firmware, Core_i7\-8086k_firmware, Core_i7\-8500y_firmware, Core_i7\-8550u_firmware, Core_i7\-8559u_firmware, Core_i7\-8565u_firmware, Core_i7\-8650u_firmware, Core_i7\-8665u_firmware, Core_i7\-8700_firmware, Core_i7\-8700b_firmware, Core_i7\-8700k_firmware, Core_i7\-8700t_firmware, Core_i7\-8705g_firmware, Core_i7\-8706g_firmware, Core_i7\-8709g_firmware, Core_i7\-8750h_firmware, Core_i7\-8809g_firmware, Core_i7\-8850h_firmware, Core_i7\-9700_firmware, Core_i7\-9700k_firmware, Core_i7\-9700t_firmware, Core_i7\-9750h_firmware, Core_i7\-9850h_firmware, Core_i9\-10900x_firmware, Core_i9\-10920x_firmware, Core_i9\-10980xe_firmware, Core_i9\-7900x_firmware, Core_i9\-7920x_firmware, Core_i9\-7940x_firmware, Core_i9\-7960x_firmware, Core_i9\-7980xe_firmware, Core_i9\-8950hk_firmware, Core_i9\-9880h_firmware, Core_i9\-9900_firmware, Core_i9\-9900k_firmware, Core_i9\-9900ks_firmware, Core_i9\-9900t_firmware, Core_i9\-9900x_firmware, Core_i9\-9920x_firmware, Core_i9\-9940x_firmware, Core_i9\-9960x_firmware, Core_i9\-9980hk_firmware, Core_i9\-9980xe_firmware, Core_m3\-6y30_firmware, Core_m3\-7y30_firmware, Core_m3\-8100y_firmware, Core_m5\-6y54_firmware, Core_m5\-6y57_firmware, Core_m7\-6y75_firmware, Core_m\-5y10_firmware, Core_m\-5y10a_firmware, Core_m\-5y10c_firmware, Core_m\-5y31_firmware, Core_m\-5y51_firmware, Core_m\-5y70_firmware, Core_m\-5y71_firmware, Graphics_driver, Pentium_3560m_firmware, Pentium_3805u_firmware, Pentium_3825u_firmware, Pentium_4405u_firmware, Pentium_4405y_firmware, Pentium_a1020_firmware, Pentium_d1507_firmware, Pentium_d1508_firmware, Pentium_d1509_firmware, Pentium_d1517_firmware, Pentium_d1519_firmware, Pentium_g4400_firmware, Pentium_g4560t_firmware, Pentium_g4600t_firmware, Pentium_gold_4410y_firmware, Pentium_gold_4415u_firmware, Pentium_gold_4415y_firmware, Pentium_gold_g4560_firmware, Pentium_gold_g4600_firmware, Pentium_gold_g4620_firmware, Pentium_gold_g5400_firmware, Pentium_gold_g5400t_firmware, Pentium_gold_g5420_firmware, Pentium_gold_g5420t_firmware, Pentium_gold_g5500_firmware, Pentium_gold_g5500t_firmware, Pentium_gold_g5600_firmware, Pentium_gold_g5620_firmware, Pentium_j3710_firmware, Pentium_j4205_firmware, Pentium_n3530_firmware, Pentium_n3540_firmware, Pentium_silver_j5005_firmware, Pentium_silver_j5040_firmware, Pentium_silver_n5000_firmware, Pentium_silver_n5030_firmware, Xeon_e3\-1501l_v6_firmware, Xeon_e3\-1501m_v6_firmware, Xeon_e3\-1505l_v5_firmware, Xeon_e3\-1505l_v6_firmware, Xeon_e3\-1505m_v5_firmware, Xeon_e3\-1505m_v6_firmware, Xeon_e3\-1515m_v5_firmware, Xeon_e3\-1535m_v5_firmware, Xeon_e3\-1535m_v6_firmware, Xeon_e3\-1545m_v5_firmware, Xeon_e3\-1558l_v5_firmware, Xeon_e3\-1565l_v5_firmware, Xeon_e3\-1575m_v5_firmware, Xeon_e3\-1578l_v5_firmware, Xeon_e3\-1585_v5_firmware, Xeon_e3\-1585l_v5_firmware, Xeon_e\-2124_firmware, Xeon_e\-2124g_firmware, Xeon_e\-2126g_firmware, Xeon_e\-2134_firmware, Xeon_e\-2136_firmware, Xeon_e\-2144g_firmware, Xeon_e\-2146g_firmware, Xeon_e\-2174g_firmware, Xeon_e\-2176g_firmware, Xeon_e\-2176m_firmware, Xeon_e\-2186g_firmware, Xeon_e\-2186m_firmware, Xeon_e\-2224_firmware, Xeon_e\-2224g_firmware, Xeon_e\-2226g_firmware, Xeon_e\-2226ge_firmware, Xeon_e\-2234_firmware, Xeon_e\-2236_firmware, Xeon_e\-2244g_firmware, Xeon_e\-2246g_firmware, Xeon_e\-2254me_firmware, Xeon_e\-2254ml_firmware, Xeon_e\-2274g_firmware, Xeon_e\-2276g_firmware, Xeon_e\-2276m_firmware, Xeon_e\-2276me_firmware, Xeon_e\-2276ml_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2278ge_firmware, Xeon_e\-2278gel_firmware, Xeon_e\-2286g_firmware, Xeon_e\-2286m_firmware, Xeon_e\-2288g_firmware, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus N/A
2019-11-15 CVE-2019-14869 A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands. Ghostscript, Fedora, Leap, 3scale_api_management, Ansible_tower, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation N/A
2019-09-06 CVE-2019-14813 A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands. Ghostscript, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 9.8
2019-11-04 CVE-2017-5333 Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file. Ubuntu_linux, Debian_linux, Icoutils, Leap, Opensuse, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation N/A
2019-11-04 CVE-2017-5332 The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable. Ubuntu_linux, Debian_linux, Icoutils, Leap, Opensuse, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation N/A
2018-10-19 CVE-2018-18284 Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator. Ghostscript, Gpl_ghostscript, Ubuntu_linux, Debian_linux, Pulse_connect_secure, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 8.6
2018-08-28 CVE-2018-15911 In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code. Ghostscript, Gpl_ghostscript, Ubuntu_linux, Debian_linux, Pulse_connect_secure, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2018-08-27 CVE-2018-15910 In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. Ghostscript, Gpl_ghostscript, Ubuntu_linux, Debian_linux, Pulse_connect_secure, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_eus, Enterprise_linux_workstation 7.8
2018-12-19 CVE-2018-15127 LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution Ubuntu_linux, Debian_linux, Libvncserver, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 9.8
2018-10-25 CVE-2018-14665 A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges. Ubuntu_linux, Debian_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Xorg\-Server 6.6