Versions
0:1.11.0-8.el8_4.11
0:5.2.5-8.el8_4
8040020240329193548.17df0a3f
0:1.11.0-8.el8_4.8
8040020231006044227.522a0ee4
0:4.18.0-305.114.1.el8_4
8040020240528055121.5b01ab7e
8040020231123154610.5b01ab7e
0:4.18.0-305.114.1.rt7.190.el8_4
0:2.1.5-2.el8_4.1
0:4.18.0-305.125.1.rt7.201.el8_4
0:4.18.0-305.103.1.el8_4
0:3.2.3-1.el8_4
0:1.11.0-8.el8_4.3
0:4.18.0-305.125.1.el8_4
0:1.11.0-8.el8_4.5
0:1.0-199.1.ac1d34c.git.el8_4.2
8040020231127154806.522a0ee4
0:4.18.0-305.120.1.el8_4
0:1.11.0-8.el8_4.10
0:4.18.0-305.103.1.rt7.178.el8_4
8040020231127153301.522a0ee4
0:1.7-6.el8_4
0:1.7.3-15.el8_4.1
8040020231101101624.522a0ee4
0:4.18.0-305.134.1.el8_4
0:1.2.10-6.el8_4
0:4.18.0-305.120.1.rt7.196.el8_4
0:5.2.5-7.el8_4
0:1.28.13-7.el8_4
8040020231127142440.522a0ee4
0:15.8-2.el8_4
8040020240703100448.522a0ee4
8040020240122165847.522a0ee4
0:4.18.0-305.134.1.rt7.210.el8_4
Recent CVEs
CVE-2024-9632
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
CVE-2024-9050
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
CVE-2024-45770
A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.
CVE-2024-45769
A vulnerability was found in Performance Co-Pilot (PCP). This flaw allows an attacker to send specially crafted data to the system, which could cause the program to misbehave or crash.
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
CVE-2024-3183
A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).
CVE-2023-4727
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
CVE-2024-3049
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.