Red Hat Security Advisory 2023-5175-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. Issues addressed include a memory leak vulnerability.
a0644a1d0fab135233266c995fe3af9950bc821b3ce5fe9a79fee01d5f4cf347
Red Hat Security Advisory 2023-5071-01 - Libcap is a library for getting and setting POSIX.1e draft 15 capabilities. Issues addressed include integer overflow and memory leak vulnerabilities.
e50cb7c52a97269d2fb99f054b0a16854c3bb81f3767dcd93bdfaadeae209fcf
Red Hat Security Advisory 2023-4983-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This asynchronous security patch is an update to Red Hat Process Automation Manager 7. Issues addressed include bypass, denial of service, deserialization, and memory leak vulnerabilities.
6867bafdeedf9ae75c9407251eef4143953398b5310e20fefd7e1e5070726ec8
Red Hat Security Advisory 2023-4799-01 - Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux. Issues addressed include a memory leak vulnerability.
905aaa6b968126362f07c6d48c3445fdd47240f5c80fe283b1345b28bcd8692f
Red Hat Security Advisory 2023-4624-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a memory leak vulnerability.
e0f5c7eca180931c2dd41e9bf1359f55373aefa75a8399a487be13af264d36ef
Red Hat Security Advisory 2023-4524-01 - Libcap is a library for getting and setting POSIX.1e draft 15 capabilities. Issues addressed include integer overflow and memory leak vulnerabilities.
9393191fe2906786aaecc95ef657be2b2d21d0856639034a2d51cd3151f514e6
Red Hat Security Advisory 2023-3822-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include a memory leak vulnerability.
12304eba2c48f6801d19aeba5d6391a309d1fe6b19187b6bb5c3fb940c85ddfa
Red Hat Security Advisory 2023-3715-01 - The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. Issues addressed include a memory leak vulnerability.
9b8b53521738368a749fe60c780351f9820f05a28d78796091f980340ba474e6
Red Hat Security Advisory 2023-3097-01 - The gssntlmssp is a GSSAPI NTLM mechanism that allows to perform NTLM authentication in GSSAPI programs. Issues addressed include memory leak and out of bounds read vulnerabilities.
847c8312f217e99ed415b61db0699adeda1300a006d99e9eddf28f3508c0c38d
Red Hat Security Advisory 2023-2898-01 - The libtar packages contain a C library for manipulating tar archives. The library supports both the strict POSIX tar format and many of the commonly used GNU extensions. Issues addressed include memory leak and out of bounds read vulnerabilities.
7f829d5c46558d34b8e0966a6bbdb5512e0f0d8629e4740cf5754cbf01d65479
Red Hat Security Advisory 2023-3000-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a memory leak vulnerability.
52692430782fa734b3f81bc5ddcffa7824db44b45fc33fd1cace19f8fb6368d3
Red Hat Security Advisory 2023-2951-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, and use-after-free vulnerabilities.
a51622249e184c96a3bb9f730d3aa3ba191710f9d6042ba82c981d273f9298b0
Red Hat Security Advisory 2023-2757-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include buffer overflow and memory leak vulnerabilities.
bc1c8d04cce1ebceddcd3daf4e0f4a2ff67d9d801623b91c0d97432d120d0102
Red Hat Security Advisory 2023-2806-01 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
e752c2a311b2b44ab5935acc2634c63609cfd392ca83f3e927e1ef1634e86f7b
Red Hat Security Advisory 2023-2969-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include memory leak and null pointer vulnerabilities.
346deac59da79643700ed12bedb47e1383d4a31ba08328abd954d72fa08195c3
Red Hat Security Advisory 2023-2805-01 - Xwayland is an X server for running X clients under Wayland. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
15c9a4484f23c0f04075b47c30f17c1864a5d56b2fcd1eee528e76e75fd7e870
Red Hat Security Advisory 2023-2736-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, and use-after-free vulnerabilities.
e697604bcace22bcbaf5d2cc5224b1d01ff8c2e2d4609264bae2a27c05f9275e
Red Hat Security Advisory 2023-2502-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a memory leak vulnerability.
4ae900c389010ce37f150156b7143cb116264368cfc06bc59b8a8b27602204e3
Red Hat Security Advisory 2023-2148-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, privilege escalation, traversal, and use-after-free vulnerabilities.
6bb9ce98c5ca5dc774537375166af3e798834e2da1f2c0b13a4afe3ba747e53e
Red Hat Security Advisory 2023-2458-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, privilege escalation, traversal, and use-after-free vulnerabilities.
b58a384a712b94d52e42ea512d4e07fd1f095c48a71c4ad8aa3f7089d090a83a
Red Hat Security Advisory 2023-2248-01 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
9567cfdca22dfb973988e9e80430c5465d61a7d1e712559323577f5ad304876a
Red Hat Security Advisory 2023-2249-01 - Xwayland is an X server for running X clients under Wayland. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
e50158bf49f4e7e16f7658adc697807c81daa04807dd1e95d5e1e8077c026d4b
Red Hat Security Advisory 2023-2444-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include memory leak and null pointer vulnerabilities.
a6456725d96e9e7f7c0565d5e5f77aff28e12f9e7de2bb06291dd17529e1b756
SecurePoint UTM versions 12.x suffers from a memory leak vulnerability via the spcgi.cgi endpoint.
15ddc40a5043fe4407a10fa673fb39fdb12a08b717f9167e70ad626fbe024350
Red Hat Security Advisory 2023-1006-01 - This release of Red Hat build of Quarkus 2.7.7 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Issues addressed include code execution, denial of service, deserialization, information leakage, memory leak, and remote SQL injection vulnerabilities.
22e7b3eb2e44fe047c265d427baa95d5cd894dbe2e83f35b2ba2c51d7269e2f5