Product:

Enterprise_linux_server_eus

(Redhat)
Date Id Summary Products Score Patch Annotated
2017-07-25 CVE-2017-7980 Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation. Ubuntu_linux, Debian_linux, Qemu, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Openstack, Virtualization 7.8
2018-07-27 CVE-2016-9603 A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. Xenserver, Debian_linux, Qemu, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_workstation, Openstack 9.9
2019-02-04 CVE-2019-3813 Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers. Ubuntu_linux, Debian_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Spice 7.5
2019-02-15 CVE-2019-6974 In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. Ubuntu_linux, Debian_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Linux_kernel, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Openshift_container_platform 8.1
2019-11-14 CVE-2019-0155 Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before... Ubuntu_linux, Atom_x5\-E3930_firmware, Atom_x5\-E3940_firmware, Atom_x7\-E3950_firmware, Celeron_g3900_firmware, Celeron_g3900e_firmware, Celeron_g3900t_firmware, Celeron_g3900te_firmware, Celeron_g3902e_firmware, Celeron_g3920_firmware, Celeron_g3930_firmware, Celeron_g3930e_firmware, Celeron_g3930t_firmware, Celeron_g3930te_firmware, Celeron_g3950_firmware, Celeron_g4900_firmware, Celeron_g4900t_firmware, Celeron_g4920_firmware, Celeron_g4930_firmware, Celeron_g4930e_firmware, Celeron_g4930t_firmware, Celeron_g4932e_firmware, Celeron_g4950_firmware, Celeron_j1750_firmware, Celeron_j1800_firmware, Celeron_j1850_firmware, Celeron_j1900_firmware, Celeron_j3060_firmware, Celeron_j3160_firmware, Celeron_j3355_firmware, Celeron_j3355e_firmware, Celeron_j3455_firmware, Celeron_j4005_firmware, Celeron_j4025_firmware, Celeron_j4105_firmware, Celeron_j4125_firmware, Celeron_n2805_firmware, Celeron_n2806_firmware, Celeron_n2807_firmware, Celeron_n2808_firmware, Celeron_n2810_firmware, Celeron_n2815_firmware, Celeron_n2820_firmware, Celeron_n2830_firmware, Celeron_n2840_firmware, Celeron_n2910_firmware, Celeron_n2920_firmware, Celeron_n2930_firmware, Celeron_n2940_firmware, Celeron_n3000_firmware, Celeron_n3010_firmware, Celeron_n3050_firmware, Celeron_n3060_firmware, Celeron_n3150_firmware, Celeron_n3160_firmware, Celeron_n3350_firmware, Celeron_n3350e_firmware, Celeron_n3450_firmware, Celeron_n4000_firmware, Celeron_n4020_firmware, Celeron_n4100_firmware, Celeron_n4120_firmware, Core_i3\-1005g1_firmware, Core_i3\-10110u_firmware, Core_i3\-10110y_firmware, Core_i3\-5005u_firmware, Core_i3\-5010u_firmware, Core_i3\-5015u_firmware, Core_i3\-5020u_firmware, Core_i3\-5157u_firmware, Core_i3\-6100_firmware, Core_i3\-6100h_firmware, Core_i3\-6100u_firmware, Core_i3\-6167u_firmware, Core_i3\-7100_firmware, Core_i3\-7100h_firmware, Core_i3\-7100t_firmware, Core_i3\-7100u_firmware, Core_i3\-7167u_firmware, Core_i3\-7300_firmware, Core_i3\-7300t_firmware, Core_i3\-7320_firmware, Core_i3\-7350k_firmware, Core_i3\-8100_firmware, Core_i3\-8100t_firmware, Core_i3\-8109u_firmware, Core_i3\-8145u_firmware, Core_i3\-8300_firmware, Core_i3\-8300t_firmware, Core_i3\-8350k_firmware, Core_i3\-9100_firmware, Core_i3\-9100t_firmware, Core_i3\-9130u_firmware, Core_i3\-9300_firmware, Core_i3\-9300t_firmware, Core_i3\-9320_firmware, Core_i3\-9350k_firmware, Core_i5\+8400_firmware, Core_i5\+8500_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-5200u_firmware, Core_i5\-5250u_firmware, Core_i5\-5257u_firmware, Core_i5\-5287u_firmware, Core_i5\-5300u_firmware, Core_i5\-5350h_firmware, Core_i5\-5350u_firmware, Core_i5\-6200u_firmware, Core_i5\-6260u_firmware, Core_i5\-6267u_firmware, Core_i5\-6287u_firmware, Core_i5\-6300hq_firmware, Core_i5\-6300u_firmware, Core_i5\-6350hq_firmware, Core_i5\-6360u_firmware, Core_i5\-6440hq_firmware, Core_i5\-6500_firmware, Core_i5\-7200u_firmware, Core_i5\-7260u_firmware, Core_i5\-7267u_firmware, Core_i5\-7287u_firmware, Core_i5\-7300hq_firmware, Core_i5\-7300u_firmware, Core_i5\-7360u_firmware, Core_i5\-7400_firmware, Core_i5\-7400t_firmware, Core_i5\-7440hq_firmware, Core_i5\-7500_firmware, Core_i5\-7500t_firmware, Core_i5\-7600_firmware, Core_i5\-7600k_firmware, Core_i5\-7600t_firmware, Core_i5\-7y54_firmware, Core_i5\-7y57_firmware, Core_i5\-8200y_firmware, Core_i5\-8250u_firmware, Core_i5\-8259u_firmware, Core_i5\-8265u_firmware, Core_i5\-8269u_firmware, Core_i5\-8300h_firmware, Core_i5\-8305g_firmware, Core_i5\-8350u_firmware, Core_i5\-8365u_firmware, Core_i5\-8400_firmware, Core_i5\-8400b_firmware, Core_i5\-8400h_firmware, Core_i5\-8400t_firmware, Core_i5\-8500_firmware, Core_i5\-8500b_firmware, Core_i5\-8500t_firmware, Core_i5\-8600_firmware, Core_i5\-8600k_firmware, Core_i5\-8600t_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400h_firmware, Core_i5\-9400t_firmware, Core_i5\-9500_firmware, Core_i5\-9500t_firmware, Core_i5\-9600_firmware, Core_i5\-9600k_firmware, Core_i5\-9600t_firmware, Core_i7\+8700_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-5500u_firmware, Core_i7\-5550u_firmware, Core_i7\-5557u_firmware, Core_i7\-5600u_firmware, Core_i7\-5650u_firmware, Core_i7\-5700hq_firmware, Core_i7\-5750hq_firmware, Core_i7\-5775c_firmware, Core_i7\-5850hq_firmware, Core_i7\-5950hq_firmware, Core_i7\-6500u_firmware, Core_i7\-6560u_firmware, Core_i7\-6567u_firmware, Core_i7\-6600u_firmware, Core_i7\-6650u_firmware, Core_i7\-6660u_firmware, Core_i7\-6700_firmware, Core_i7\-6700hq_firmware, Core_i7\-6700t_firmware, Core_i7\-6700te_firmware, Core_i7\-6770hq_firmware, Core_i7\-6820hk_firmware, Core_i7\-6820hq_firmware, Core_i7\-6870hq_firmware, Core_i7\-6920hq_firmware, Core_i7\-6970hq_firmware, Core_i7\-7500u_firmware, Core_i7\-7560u_firmware, Core_i7\-7567u_firmware, Core_i7\-7600u_firmware, Core_i7\-7660u_firmware, Core_i7\-7700_firmware, Core_i7\-7700hq_firmware, Core_i7\-7700k_firmware, Core_i7\-7700t_firmware, Core_i7\-7800x_firmware, Core_i7\-7820hk_firmware, Core_i7\-7820hq_firmware, Core_i7\-7820x_firmware, Core_i7\-7920hq_firmware, Core_i7\-7y75_firmware, Core_i7\-8086k_firmware, Core_i7\-8500y_firmware, Core_i7\-8550u_firmware, Core_i7\-8559u_firmware, Core_i7\-8565u_firmware, Core_i7\-8650u_firmware, Core_i7\-8665u_firmware, Core_i7\-8700_firmware, Core_i7\-8700b_firmware, Core_i7\-8700k_firmware, Core_i7\-8700t_firmware, Core_i7\-8705g_firmware, Core_i7\-8706g_firmware, Core_i7\-8709g_firmware, Core_i7\-8750h_firmware, Core_i7\-8809g_firmware, Core_i7\-8850h_firmware, Core_i7\-9700_firmware, Core_i7\-9700k_firmware, Core_i7\-9700t_firmware, Core_i7\-9750h_firmware, Core_i7\-9850h_firmware, Core_i9\-10900x_firmware, Core_i9\-10920x_firmware, Core_i9\-10980xe_firmware, Core_i9\-7900x_firmware, Core_i9\-7920x_firmware, Core_i9\-7940x_firmware, Core_i9\-7960x_firmware, Core_i9\-7980xe_firmware, Core_i9\-8950hk_firmware, Core_i9\-9880h_firmware, Core_i9\-9900_firmware, Core_i9\-9900k_firmware, Core_i9\-9900ks_firmware, Core_i9\-9900t_firmware, Core_i9\-9900x_firmware, Core_i9\-9920x_firmware, Core_i9\-9940x_firmware, Core_i9\-9960x_firmware, Core_i9\-9980hk_firmware, Core_i9\-9980xe_firmware, Core_m3\-6y30_firmware, Core_m3\-7y30_firmware, Core_m3\-8100y_firmware, Core_m5\-6y54_firmware, Core_m5\-6y57_firmware, Core_m7\-6y75_firmware, Core_m\-5y10_firmware, Core_m\-5y10a_firmware, Core_m\-5y10c_firmware, Core_m\-5y31_firmware, Core_m\-5y51_firmware, Core_m\-5y70_firmware, Core_m\-5y71_firmware, Graphics_driver, Pentium_3560m_firmware, Pentium_3805u_firmware, Pentium_3825u_firmware, Pentium_4405u_firmware, Pentium_4405y_firmware, Pentium_a1020_firmware, Pentium_d1507_firmware, Pentium_d1508_firmware, Pentium_d1509_firmware, Pentium_d1517_firmware, Pentium_d1519_firmware, Pentium_g4400_firmware, Pentium_g4560t_firmware, Pentium_g4600t_firmware, Pentium_gold_4410y_firmware, Pentium_gold_4415u_firmware, Pentium_gold_4415y_firmware, Pentium_gold_g4560_firmware, Pentium_gold_g4600_firmware, Pentium_gold_g4620_firmware, Pentium_gold_g5400_firmware, Pentium_gold_g5400t_firmware, Pentium_gold_g5420_firmware, Pentium_gold_g5420t_firmware, Pentium_gold_g5500_firmware, Pentium_gold_g5500t_firmware, Pentium_gold_g5600_firmware, Pentium_gold_g5620_firmware, Pentium_j3710_firmware, Pentium_j4205_firmware, Pentium_n3530_firmware, Pentium_n3540_firmware, Pentium_silver_j5005_firmware, Pentium_silver_j5040_firmware, Pentium_silver_n5000_firmware, Pentium_silver_n5030_firmware, Xeon_e3\-1501l_v6_firmware, Xeon_e3\-1501m_v6_firmware, Xeon_e3\-1505l_v5_firmware, Xeon_e3\-1505l_v6_firmware, Xeon_e3\-1505m_v5_firmware, Xeon_e3\-1505m_v6_firmware, Xeon_e3\-1515m_v5_firmware, Xeon_e3\-1535m_v5_firmware, Xeon_e3\-1535m_v6_firmware, Xeon_e3\-1545m_v5_firmware, Xeon_e3\-1558l_v5_firmware, Xeon_e3\-1565l_v5_firmware, Xeon_e3\-1575m_v5_firmware, Xeon_e3\-1578l_v5_firmware, Xeon_e3\-1585_v5_firmware, Xeon_e3\-1585l_v5_firmware, Xeon_e\-2124_firmware, Xeon_e\-2124g_firmware, Xeon_e\-2126g_firmware, Xeon_e\-2134_firmware, Xeon_e\-2136_firmware, Xeon_e\-2144g_firmware, Xeon_e\-2146g_firmware, Xeon_e\-2174g_firmware, Xeon_e\-2176g_firmware, Xeon_e\-2176m_firmware, Xeon_e\-2186g_firmware, Xeon_e\-2186m_firmware, Xeon_e\-2224_firmware, Xeon_e\-2224g_firmware, Xeon_e\-2226g_firmware, Xeon_e\-2226ge_firmware, Xeon_e\-2234_firmware, Xeon_e\-2236_firmware, Xeon_e\-2244g_firmware, Xeon_e\-2246g_firmware, Xeon_e\-2254me_firmware, Xeon_e\-2254ml_firmware, Xeon_e\-2274g_firmware, Xeon_e\-2276g_firmware, Xeon_e\-2276m_firmware, Xeon_e\-2276me_firmware, Xeon_e\-2276ml_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2278ge_firmware, Xeon_e\-2278gel_firmware, Xeon_e\-2286g_firmware, Xeon_e\-2286m_firmware, Xeon_e\-2288g_firmware, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus 7.8
2018-09-25 CVE-2018-14634 An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable. Ubuntu_linux, Linux_kernel, Active_iq_performance_analytics_services, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2019-01-11 CVE-2018-16864 An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable. Ubuntu_linux, Debian_linux, Systemd, Communications_session_border_controller, Enterprise_communications_broker, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2019-01-11 CVE-2018-16865 An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable. Ubuntu_linux, Debian_linux, Systemd, Communications_session_border_controller, Enterprise_communications_broker, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2019-03-21 CVE-2019-6454 An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic). Ubuntu_linux, Debian_linux, Fedora, Systemd, Active_iq_performance_analytics_services, Leap, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 5.5
2018-10-04 CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. Tomcat, Ubuntu_linux, Debian_linux, Snap_creator_framework, Communications_application_session_controller, Hospitality_guest_access, Instantis_enterprisetrack, Retail_order_broker, Secure_global_desktop, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 4.3