Elasticsearch Docker Image CVE Report
Back to Overview

We use trivy to scan the Docker image for CVEs. The report is updated every Wednesday morning and Sunday evening.

Docker image: docker.elastic.co/elasticsearch/elasticsearch

Last updated: 2026-05-06T07:39:22.911019

CVE IDDescriptionSeverityCVSS ScoreAffected VersionsNot Affected Versions
CVE-2025-66516Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.CRITICAL

NVD: 9.8

RedHat: 10

  • 9.1.2
  • 9.1.1
  • 9.1.0
  • 9.0.5
  • 9.0.4
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-54988Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.CRITICAL

NVD: n/a

RedHat: 9.4

  • 9.1.2
  • 9.1.1
  • 9.1.0
  • 9.0.5
  • 9.0.4
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2026-33845A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.HIGH

NVD: 9.1

RedHat: 7.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-33846A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely on handshake type, without validating that the message_length field remains consistent across all fragments of the same logical message. An attacker can exploit this by sending crafted DTLS fragments with conflicting message_length values, causing the implementation to allocate a buffer based on a smaller initial fragment and subsequently write beyond its bounds using larger, inconsistent fragments. Because the merge operation does not enforce proper bounds checking against the allocated buffer size, this results in an out-of-bounds write on the heap. The vulnerability is remotely exploitable without authentication via the DTLS handshake path and can lead to application crashes or potential memory corruption.HIGH

NVD: n/a

RedHat: 7.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-40356In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message.HIGH

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-4878A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.HIGH

NVD: 7

RedHat: 6.7

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
CVE-2026-5598Covert timing channel vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA core on all (core modules). This vulnerability is associated with program files FrodoEngine.Java. This issue affects BC-JAVA: from 1.71 before 1.84.HIGH

NVD: n/a

RedHat: 7.5

  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.4.0
  • 8.19.15
  • 8.11.4
  • 8.11.3
  • 8.11.2
CVE-2026-4424A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.HIGH

NVD: n/a

RedHat: 7.5

  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.2.8
  • 9.4.0
  • 9.3.4
  • 8.19.15
  • 8.19.14
  • 8.19.13
CVE-2026-33870Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final and 4.2.10.Final fix the issue.HIGH

NVD: n/a

RedHat: 7.5

  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.2.8
  • 9.4.0
  • 9.3.4
  • 8.19.15
CVE-2026-33871Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames, allows an user to cause excessive CPU consumption with minimal bandwidth, rendering the server unresponsive. Versions 4.1.132.Final and 4.2.10.Final fix the issue.HIGH

NVD: 7.5

RedHat: 7.5

  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.2.8
  • 9.4.0
  • 9.3.4
  • 8.19.15
CVE-2026-4111A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.HIGH

NVD: n/a

RedHat: 7.5

  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.2.7
  • 9.2.6
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.2.8
  • 8.19.15
CVE-2025-15467Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.HIGH

NVD: n/a

RedHat: 9.8

  • 9.3.0
  • 9.2.5
  • 9.2.4
  • 9.2.3
  • 9.2.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-68973In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)HIGH

NVD: 7

RedHat: 7.8

  • 9.2.4
  • 9.2.3
  • 9.2.2
  • 9.2.1
  • 9.2.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-66566yawkat LZ4 Java provides LZ4 compression for Java. Insufficient clearing of the output buffer in Java-based decompressor implementations in lz4-java 1.10.0 and earlier allows remote attackers to read previous buffer contents via crafted compressed input. In applications where the output buffer is reused without being cleared, this may lead to disclosure of sensitive data. JNI-based implementations are not affected. This vulnerability is fixed in 1.10.1.HIGH

NVD: n/a

RedHat: 7.5

  • 9.2.3
  • 9.2.2
  • 9.2.1
  • 9.2.0
  • 9.1.9
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-12183Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.HIGH

NVD: n/a

RedHat: 6.5

  • 9.2.2
  • 9.2.1
  • 9.2.0
  • 9.1.8
  • 9.1.7
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-6965There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.HIGH

NVD: 9.8

RedHat: 7.7

  • 9.2.1
  • 9.2.0
  • 9.1.7
  • 9.1.6
  • 9.1.5
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-55163Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.HIGH

NVD: 7.5

RedHat: 7.5

  • 9.1.3
  • 9.1.2
  • 9.1.1
  • 9.1.0
  • 9.0.6
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-5914A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.HIGH

NVD: 7.8

RedHat: 7.8

  • 9.1.2
  • 9.1.1
  • 9.1.0
  • 9.0.5
  • 9.0.4
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-7425A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.HIGH

NVD: n/a

RedHat: 7.8

  • 9.1.0
  • 9.0.4
  • 9.0.3
  • 9.0.2
  • 9.0.1
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-49794A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.HIGH

NVD: n/a

RedHat: 9.1

  • 9.0.3
  • 9.0.2
  • 9.0.1
  • 9.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-49796A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.HIGH

NVD: n/a

RedHat: 9.1

  • 9.0.3
  • 9.0.2
  • 9.0.1
  • 9.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-24970Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.HIGH

NVD: n/a

RedHat: 7.5

  • 8.17.2
  • 8.17.1
  • 8.17.0
  • 8.16.4
  • 8.16.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2024-57699A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.HIGH

NVD: n/a

RedHat: 7.5

  • 8.17.2
  • 8.17.1
  • 8.17.0
  • 8.16.4
  • 8.16.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-52428In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.15.5
  • 8.15.4
  • 8.15.3
  • 8.15.2
  • 8.15.1
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-1370[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.15.5
  • 8.15.4
  • 8.15.3
  • 8.15.2
  • 8.15.1
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2024-7254Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.15.2
  • 8.15.1
  • 8.15.0
  • 8.14.3
  • 8.14.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-52999jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.HIGH

NVD: n/a

RedHat: 7.5

  • 8.14.3
  • 8.14.2
  • 8.14.1
  • 8.14.0
  • 8.13.4
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2024-47554Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.HIGH

NVD: n/a

RedHat: 4.3

  • 8.13.4
  • 8.13.3
  • 8.13.2
  • 8.13.1
  • 8.13.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
GHSA-xpw8-rcwv-8f8pA client might overload the server by issue frequent RST frames. This can cause a massive amount of load on the remote system and so cause a DDOS attack. ### Impact This is a DDOS attack, any http2 server is affected and so you should update as soon as possible. ### Patches This is patched in version 4.1.100.Final. ### Workarounds A user can limit the amount of RST frames that are accepted per connection over a timeframe manually using either an own `Http2FrameListener` implementation or an `ChannelInboundHandler` implementation (depending which http2 API is used). ### References - https://www.cve.org/CVERecord?id=CVE-2023-44487 - https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ - https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/HIGH

NVD: n/a

RedHat: n/a

  • 8.13.4
  • 8.13.3
  • 8.13.2
  • 8.13.1
  • 8.13.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-44487The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.11.1
  • 8.11.0
  • 8.10.4
  • 8.10.3
  • 8.10.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-34054 In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled. HIGH

NVD: 7.5

RedHat: n/a

  • 8.11.1
  • 8.11.0
  • 8.10.4
  • 8.10.3
  • 8.10.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-34062In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources. HIGH

NVD: 7.5

RedHat: 7.5

  • 8.11.1
  • 8.11.0
  • 8.10.4
  • 8.10.3
  • 8.10.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-40690All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.9.0
  • 8.8.2
  • 8.8.1
  • 8.8.0
  • 8.7.1
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-31418An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elastic Engineering and we have no indication that the issue is known or that it is being exploited in the wild.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.8.2
  • 8.8.1
  • 8.8.0
  • 8.7.1
  • 8.7.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-31684A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.8.1
  • 8.8.0
  • 8.7.1
  • 8.7.0
  • 8.6.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-1471SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.HIGH

NVD: 9.8

RedHat: 9.8

  • 8.7.1
  • 8.7.0
  • 8.6.2
  • 8.6.1
  • 8.6.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2020-36518jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.6.2
  • 8.6.1
  • 8.6.0
  • 8.5.3
  • 8.5.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-42003In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.6.2
  • 8.6.1
  • 8.6.0
  • 8.5.3
  • 8.5.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-42004In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.6.2
  • 8.6.1
  • 8.6.0
  • 8.5.3
  • 8.5.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-0286There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.HIGH

NVD: 7.4

RedHat: 7.4

  • 8.6.1
  • 8.6.0
  • 8.5.3
  • 8.5.2
  • 8.5.1
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-3509A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.HIGH

NVD: 7.5

RedHat: 5.3

  • 8.5.3
  • 8.5.2
  • 8.5.1
  • 8.5.0
  • 8.4.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-3510A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. HIGH

NVD: 7.5

RedHat: 5.3

  • 8.5.3
  • 8.5.2
  • 8.5.1
  • 8.5.0
  • 8.4.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-31159The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` .HIGH

NVD: 6.5

RedHat: n/a

  • 8.4.3
  • 8.4.2
  • 8.4.1
  • 8.4.0
  • 8.3.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-25857The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.4.3
  • 8.4.2
  • 8.4.1
  • 8.4.0
  • 8.3.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2020-25649A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.2.3
  • 8.2.2
  • 8.2.1
  • 8.2.0
  • 8.1.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-46877jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.2.3
  • 8.2.2
  • 8.2.1
  • 8.2.0
  • 8.1.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2020-28491This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.2.3
  • 8.2.2
  • 8.2.1
  • 8.2.0
  • 8.1.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-25647The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.2.3
  • 8.2.2
  • 8.2.1
  • 8.2.0
  • 8.1.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-22573The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or aboveHIGH

NVD: 7.3

RedHat: 7.3

  • 8.2.3
  • 8.2.2
  • 8.2.1
  • 8.2.0
  • 8.1.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-23712A Denial of Service flaw was discovered in Elasticsearch. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.2.0
  • 8.1.3
  • 8.1.2
  • 8.1.1
  • 8.1.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-0778The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).HIGH

NVD: 7.5

RedHat: 7.5

  • 8.1.0
  • 8.0.1
  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-37136The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attackHIGH

NVD: 7.5

RedHat: 7.5

  • 8.0.1
  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-37137The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.HIGH

NVD: 7.5

RedHat: 7.5

  • 8.0.1
  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-24407In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.HIGH

NVD: 8.8

RedHat: 8.8

  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-22569An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.HIGH

NVD: 5.5

RedHat: 5.5

  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-5278A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.MEDIUM

NVD: n/a

RedHat: 4.4

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2025-13034When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.MEDIUM

NVD: n/a

RedHat: 6.8

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2025-14017When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.MEDIUM

NVD: n/a

RedHat: 4.8

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.18.2
  • 8.18.1
CVE-2026-1965libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an application could wrongfully reuse an existing connection to the same server that was authenticated using different credentials. One underlying reason being that Negotiate sometimes authenticates *connections* and not *requests*, contrary to how HTTP is designed to work. An application that allows Negotiate authentication to a server (that responds wanting Negotiate) with `user1:password1` and then does another operation to the same server also using Negotiate but with `user2:password2` (while the previous connection is still alive) - the second request wrongly reused the same connection and since it then sees that the Negotiate negotiation is already made, it just sends the request over that connection thinking it uses the user2 credentials when it is in fact still using the connection authenticated for user1... The set of authentication methods to use is set with `CURLOPT_HTTPAUTH`. Applications can disable libcurl's reuse of connections and thus mitigate this problem, by using one of the following libcurl options to alter how connections are or are not reused: `CURLOPT_FRESH_CONNECT`, `CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the curl_multi API).MEDIUM

NVD: n/a

RedHat: 6.8

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.18.2
  • 8.18.1
CVE-2026-3783When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host also to the second one.MEDIUM

NVD: n/a

RedHat: 5.7

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.18.2
  • 8.18.1
CVE-2026-3784curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.18.2
  • 8.18.1
CVE-2026-3805When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.MEDIUM

NVD: n/a

RedHat: 6.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-4873A flaw was found in curl. A remote attacker could exploit this by initiating an unencrypted connection (via IMAP, SMTP, or POP3) and then making a subsequent request to the same host that requires Transport Layer Security (TLS). Due to incorrect connection reuse, the subsequent request would bypass the TLS requirement, leading to the transmission of sensitive information in cleartext. This vulnerability, categorized as Cleartext Transmission of Sensitive Information (CWE-319), results in information disclosure.MEDIUM

NVD: n/a

RedHat: 5.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-5545A flaw was found in libcurl. An application using libcurl that performs an authenticated HTTP(S) request after a Negotiate-authenticated one to the same host may incorrectly reuse the previous connection. This authentication bypass vulnerability allows the second request to be sent over a connection authenticated with different credentials, potentially leading to unauthorized access or information disclosure.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-5773A flaw was found in libcurl. Due to a logical error in the connection reuse mechanism for SMB (Server Message Block) transfers, libcurl might reuse an existing SMB connection with a different share than intended. This vulnerability, categorized as CWE-488 (Exposure of Data Element to Wrong Session), could lead to the download of an incorrect file or the upload of a file to an unintended location when an application uses libcurl for SMB transfers.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-6253A flaw was found in curl. When curl is configured to use distinct proxies for different URL schemes, a redirect from a URL using an authenticated proxy to one using an unauthenticated proxy can inadvertently expose the initial proxy's credentials. This improper credential management (CWE-522) may allow an attacker to gain unauthorized access or information by intercepting these disclosed credentials.MEDIUM

NVD: n/a

RedHat: 5.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-6429A flaw was found in libcurl. When configured to use a .netrc file for credentials and follow HTTP redirects, libcurl can inadvertently send the password from the initial connection to the redirected host. This sensitive information disclosure occurs when both the original and redirect URLs use clear text HTTP, are performed over the same HTTP proxy, and the same connection is reused. This vulnerability, categorized as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200), could allow an attacker to obtain user credentials.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2025-14087A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.MEDIUM

NVD: 9.8

RedHat: 5.6

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2025-14512A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-1484A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.MEDIUM

NVD: n/a

RedHat: 4.2

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-1489A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.MEDIUM

NVD: n/a

RedHat: 5.4

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-4046The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.MEDIUM

NVD: n/a

RedHat: 5.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-4437Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-5435The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.MEDIUM

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-5450Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.MEDIUM

NVD: n/a

RedHat: 5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-5928Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash. A bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp->_IO_read_ptr) instead of the actual wide-stream read pointer (fp->_wide_data->_IO_read_ptr). The program crash may happen in cases where fp->_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.MEDIUM

NVD: n/a

RedHat: 5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2025-68972In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.MEDIUM

NVD: 4.7

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-3833A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees`. A remote attacker can exploit this by crafting a leaf certificate with casing differences in the Subject Alternative Name (SAN), leading to a policy bypass where a certificate that should be rejected is instead accepted. This could result in unauthorized access or information disclosure.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-40355In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.MEDIUM

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2023-30571Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.MEDIUM

NVD: 5.3

RedHat: 5.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2025-60753An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).MEDIUM

NVD: n/a

RedHat: 5.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-4426A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.MEDIUM

NVD: n/a

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-5745A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare "d" or "default" tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).MEDIUM

NVD: n/a

RedHat: 5.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-27456util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.MEDIUM

NVD: n/a

RedHat: 4.7

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
  • 8.17.7
CVE-2026-41989Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.MEDIUM

NVD: n/a

RedHat: 7.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-0990A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.MEDIUM

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-1757A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.MEDIUM

NVD: n/a

RedHat: 6.2

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-6732A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.MEDIUM

NVD: 7.5

RedHat: 6.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-22185OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.MEDIUM

NVD: n/a

RedHat: 6.8

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-31790Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the application process which leads to sensitive data leakage to an attacker. RSA_public_encrypt() returns the number of bytes written on success and -1 on error. The affected code tests only whether the return value is non-zero. As a result, if RSA encryption fails, encapsulation can still return success to the caller, set the output lengths, and leave the caller to use the contents of the ciphertext buffer as if a valid KEM ciphertext had been produced. If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an attacker-supplied invalid RSA public key without first validating that key, then this may cause stale or uninitialized contents of the caller-provided ciphertext buffer to be disclosed to the attacker in place of the KEM ciphertext. As a workaround calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate the issue. The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.MEDIUM

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
CVE-2026-28386Issue summary: Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support can trigger an out-of-bounds read of up to 15 bytes when processing partial cipher blocks. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application if the input buffer ends at a memory page boundary and the following page is unmapped. There is no information disclosure as the over-read bytes are not written to output. The vulnerable code path is only reached when processing partial blocks (when a previous call left an incomplete block and the current call provides fewer bytes than needed to complete it). Additionally, the input buffer must be positioned at a page boundary with the following page unmapped. CFB mode is not used in TLS/DTLS protocols, which use CBC, GCM, CCM, or ChaCha20-Poly1305 instead. For these reasons the issue was assessed as Low severity according to our Security Policy. Only x86-64 systems with AVX-512 and VAES instruction support are affected. Other architectures and systems without VAES support use different code paths that are not affected. OpenSSL FIPS module in 3.6 version is affected by this issue.MEDIUM

NVD: 7.5

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-28390Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.MEDIUM

NVD: 7.5

RedHat: 7.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.8
CVE-2026-2100A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.MEDIUM

NVD: 7.5

RedHat: 5.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-29111systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.MEDIUM

NVD: n/a

RedHat: 7.8

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.18.2
  • 8.18.1
  • 8.18.0
CVE-2026-4105A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.MEDIUM

NVD: n/a

RedHat: 6.7

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-34743XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.MEDIUM

NVD: 5.3

RedHat: 5.3

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
GHSA-72hv-8253-57qq### Summary The non-blocking (async) JSON parser in `jackson-core` bypasses the `maxNumberLength` constraint (default: 1000 characters) defined in `StreamReadConstraints`. This allows an attacker to send JSON with arbitrarily long numbers through the async parser API, leading to excessive memory allocation and potential CPU exhaustion, resulting in a Denial of Service (DoS). The standard synchronous parser correctly enforces this limit, but the async parser fails to do so, creating an inconsistent enforcement policy. ### Details The root cause is that the async parsing path in `NonBlockingUtf8JsonParserBase` (and related classes) does not call the methods responsible for number length validation. - The number parsing methods (e.g., `_finishNumberIntegralPart`) accumulate digits into the `TextBuffer` without any length checks. - After parsing, they call `_valueComplete()`, which finalizes the token but does **not** call `resetInt()` or `resetFloat()`. - The `resetInt()`/`resetFloat()` methods in `ParserBase` are where the `validateIntegerLength()` and `validateFPLength()` checks are performed. - Because this validation step is skipped, the `maxNumberLength` constraint is never enforced in the async code path. ### PoC The following JUnit 5 test demonstrates the vulnerability. It shows that the async parser accepts a 5,000-digit number, whereas the limit should be 1,000. ```java package tools.jackson.core.unittest.dos; import java.nio.charset.StandardCharsets; import org.junit.jupiter.api.Test; import tools.jackson.core.*; import tools.jackson.core.exc.StreamConstraintsException; import tools.jackson.core.json.JsonFactory; import tools.jackson.core.json.async.NonBlockingByteArrayJsonParser; import static org.junit.jupiter.api.Assertions.*; /** * POC: Number Length Constraint Bypass in Non-Blocking (Async) JSON Parsers * * Authors: sprabhav7, rohan-repos * * maxNumberLength default = 1000 characters (digits). * A number with more than 1000 digits should be rejected by any parser. * * BUG: The async parser never calls resetInt()/resetFloat() which is where * validateIntegerLength()/validateFPLength() lives. Instead it calls * _valueComplete() which skips all number length validation. * * CWE-770: Allocation of Resources Without Limits or Throttling */ class AsyncParserNumberLengthBypassTest { private static final int MAX_NUMBER_LENGTH = 1000; private static final int TEST_NUMBER_LENGTH = 5000; private final JsonFactory factory = new JsonFactory(); // CONTROL: Sync parser correctly rejects a number exceeding maxNumberLength @Test void syncParserRejectsLongNumber() throws Exception { byte[] payload = buildPayloadWithLongInteger(TEST_NUMBER_LENGTH); // Output to console System.out.println("[SYNC] Parsing " + TEST_NUMBER_LENGTH + "-digit number (limit: " + MAX_NUMBER_LENGTH + ")"); try { try (JsonParser p = factory.createParser(ObjectReadContext.empty(), payload)) { while (p.nextToken() != null) { if (p.currentToken() == JsonToken.VALUE_NUMBER_INT) { System.out.println("[SYNC] Accepted number with " + p.getText().length() + " digits — UNEXPECTED"); } } } fail("Sync parser must reject a " + TEST_NUMBER_LENGTH + "-digit number"); } catch (StreamConstraintsException e) { System.out.println("[SYNC] Rejected with StreamConstraintsException: " + e.getMessage()); } } // VULNERABILITY: Async parser accepts the SAME number that sync rejects @Test void asyncParserAcceptsLongNumber() throws Exception { byte[] payload = buildPayloadWithLongInteger(TEST_NUMBER_LENGTH); NonBlockingByteArrayJsonParser p = (NonBlockingByteArrayJsonParser) factory.createNonBlockingByteArrayParser(ObjectReadContext.empty()); p.feedInput(payload, 0, payload.length); p.endOfInput(); boolean foundNumber = false; try { while (p.nextToken() != null) { if (p.currentToken() == JsonToken.VALUE_NUMBER_INT) { foundNumber = true; String numberText = p.getText(); assertEquals(TEST_NUMBER_LENGTH, numberText.length(), "Async parser silently accepted all " + TEST_NUMBER_LENGTH + " digits"); } } // Output to console System.out.println("[ASYNC INT] Accepted number with " + TEST_NUMBER_LENGTH + " digits — BUG CONFIRMED"); assertTrue(foundNumber, "Parser should have produced a VALUE_NUMBER_INT token"); } catch (StreamConstraintsException e) { fail("Bug is fixed — async parser now correctly rejects long numbers: " + e.getMessage()); } p.close(); } private byte[] buildPayloadWithLongInteger(int numDigits) { StringBuilder sb = new StringBuilder(numDigits + 10); sb.append("{\"v\":"); for (int i = 0; i < numDigits; i++) { sb.append((char) ('1' + (i % 9))); } sb.append('}'); return sb.toString().getBytes(StandardCharsets.UTF_8); } } ``` ### Impact A malicious actor can send a JSON document with an arbitrarily long number to an application using the async parser (e.g., in a Spring WebFlux or other reactive application). This can cause: 1. **Memory Exhaustion:** Unbounded allocation of memory in the `TextBuffer` to store the number's digits, leading to an `OutOfMemoryError`. 2. **CPU Exhaustion:** If the application subsequently calls `getBigIntegerValue()` or `getDecimalValue()`, the JVM can be tied up in O(n^2) `BigInteger` parsing operations, leading to a CPU-based DoS. ### Suggested Remediation The async parsing path should be updated to respect the `maxNumberLength` constraint. The simplest fix appears to ensure that `_valueComplete()` or a similar method in the async path calls the appropriate validation methods (`resetInt()` or `resetFloat()`) already present in `ParserBase`, mirroring the behavior of the synchronous parsers. **NOTE:** This research was performed in collaboration with [rohan-repos](https://github.com/rohan-repos)MEDIUM

NVD: n/a

RedHat: n/a

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
    CVE-2026-41417### Summary Netty allows request-line validation to be bypassed when a `DefaultHttpRequest` or `DefaultFullHttpRequest` is created first and its URI is later changed via `setUri()`. The constructors reject CRLF and whitespace characters that would break the start-line, but `setUri()` does not apply the same validation. `HttpRequestEncoder` and `RtspEncoder` then write the URI into the request line verbatim. If attacker-controlled input reaches `setUri()`, this enables CRLF injection and insertion of additional HTTP or RTSP requests. In practice, this leads to HTTP request smuggling / desynchronization on the HTTP side and request injection on the RTSP side. ### Details The root issue is that URI validation exists only on the constructor path, but not on the public setter path. - `io.netty.handler.codec.http.DefaultHttpRequest` - The constructor calls `HttpUtil.validateRequestLineTokens(method, uri)` - `setUri(String uri)` only performs `checkNotNull` and does not validate - `io.netty.handler.codec.http.DefaultFullHttpRequest` - `setUri(String uri)` delegates to the parent implementation - `io.netty.handler.codec.http.HttpRequestEncoder` - Writes `request.uri()` directly into the request line - `io.netty.handler.codec.rtsp.RtspEncoder` - Writes `request.uri()` directly into the request line This creates the following bypass: 1. An application creates a `DefaultHttpRequest` or `DefaultFullHttpRequest` with a safe URI 2. Later, attacker-influenced input is passed into `setUri()` 3. `HttpRequestEncoder` or `RtspEncoder` encodes that value verbatim 4. The downstream server, proxy, or RTSP peer interprets the injected bytes after CRLF as separate requests This appears to be an incomplete fix pattern where start-line validation exists, but can still be bypassed through a mutable public API. ### PoC (HTTP) The following code first creates a normal request object and then injects a malicious request line using `setUri()`. ```java import io.netty.buffer.ByteBuf; import io.netty.channel.embedded.EmbeddedChannel; import io.netty.handler.codec.http.DefaultHttpRequest; import io.netty.handler.codec.http.HttpMethod; import io.netty.handler.codec.http.HttpRequestEncoder; import io.netty.handler.codec.http.HttpServerCodec; import io.netty.handler.codec.http.HttpVersion; import io.netty.util.CharsetUtil; public final class HttpSetUriSmugglePoc { public static void main(String[] args) { EmbeddedChannel client = new EmbeddedChannel(new HttpRequestEncoder()); EmbeddedChannel server = new EmbeddedChannel(new HttpServerCodec()); DefaultHttpRequest request = new DefaultHttpRequest( HttpVersion.HTTP_1_1, HttpMethod.GET, "/safe"); request.setUri("/s1 HTTP/1.1\r\n" + "\r\n" + "POST /s2 HTTP/1.1\r\n" + "content-length: 11\r\n\r\n" + "Hello World" + "GET /s1"); client.writeOutbound(request); ByteBuf outbound = client.readOutbound(); System.out.println("=== Raw encoded request ==="); System.out.println(outbound.toString(CharsetUtil.US_ASCII)); System.out.println("=== Decoded by HttpServerCodec ==="); server.writeInbound(outbound.retainedDuplicate()); Object msg; while ((msg = server.readInbound()) != null) { System.out.println(msg); } outbound.release(); client.finishAndReleaseAll(); server.finishAndReleaseAll(); } } ``` When reproduced, the raw encoded request looks like this: ```http GET /s1 HTTP/1.1 POST /s2 HTTP/1.1 content-length: 11 Hello WorldGET /s1 HTTP/1.1 ``` `HttpServerCodec` then parses this as multiple HTTP messages rather than a single request: - `GET /s1` - `POST /s2` with body `Hello World` - trailing `GET /s1` This confirms that the value supplied through `setUri()` is interpreted on the wire as additional requests. ### PoC (RTSP) The same root cause also affects `RtspEncoder`. A minimal reproduction is shown below. ```java import io.netty.buffer.ByteBuf; import io.netty.channel.embedded.EmbeddedChannel; import io.netty.handler.codec.http.DefaultHttpRequest; import io.netty.handler.codec.rtsp.RtspDecoder; import io.netty.handler.codec.rtsp.RtspEncoder; import io.netty.handler.codec.rtsp.RtspMethods; import io.netty.handler.codec.rtsp.RtspVersions; import io.netty.util.CharsetUtil; public final class RtspSetUriSmugglePoc { public static void main(String[] args) { EmbeddedChannel client = new EmbeddedChannel(new RtspEncoder()); EmbeddedChannel server = new EmbeddedChannel(new RtspDecoder()); DefaultHttpRequest request = new DefaultHttpRequest( RtspVersions.RTSP_1_0, RtspMethods.OPTIONS, "rtsp://safe/media"); request.setUri("rtsp://cam/stream RTSP/1.0\r\n" + "CSeq: 1\r\n\r\n" + "DESCRIBE rtsp://cam/secret RTSP/1.0\r\n" + "CSeq: 2\r\n\r\n" + "OPTIONS rtsp://cam/final"); client.writeOutbound(request); ByteBuf outbound = client.readOutbound(); System.out.println("=== Raw encoded RTSP request ==="); System.out.println(outbound.toString(CharsetUtil.US_ASCII)); System.out.println("=== Decoded by RtspDecoder ==="); server.writeInbound(outbound.retainedDuplicate()); } } ``` When reproduced, `RtspEncoder` generates consecutive RTSP requests in a single encoded payload: ```text OPTIONS rtsp://cam/stream RTSP/1.0 CSeq: 1 DESCRIBE rtsp://cam/secret RTSP/1.0 CSeq: 2 OPTIONS rtsp://cam/final RTSP/1.0 ``` `RtspDecoder` then parses this as three separate RTSP requests: - `OPTIONS rtsp://cam/stream` - `DESCRIBE rtsp://cam/secret` - `OPTIONS rtsp://cam/final` This confirms that the same setter bypass is exploitable for RTSP request injection as well. ### Impact The vulnerable conditions are: - The application uses `DefaultHttpRequest` or `DefaultFullHttpRequest` - The request object is created first and later modified through `setUri()` - The value passed into `setUri()` is attacker-controlled or attacker-influenced - The object is eventually serialized by `HttpRequestEncoder` or `RtspEncoder` Under those conditions, an attacker may be able to: - perform HTTP request smuggling - trigger proxy/backend desynchronization - inject additional requests toward internal APIs - confuse request boundaries and bypass assumptions around authentication or routing - inject RTSP requests The exact impact depends on how the application constructs URIs and how the upstream/downstream HTTP or RTSP components parse request boundaries, but the security impact is real and reproducible. ### Root Cause Validation is enforced only at object construction time, but not on the public mutation API that can break the same security invariant. As a result, the constructors are safe while the public `setUri()` path is not, and the encoders trust and serialize the mutated value without revalidation. ### Suggested Fix Direction `DefaultHttpRequest.setUri()` and all delegating/inheriting paths should apply the same request-line token validation as the constructors. Recommended regression coverage: - verify that `setUri()` rejects CRLF-containing input after object construction - verify that `DefaultFullHttpRequest.setUri()` is blocked as well - verify that spaces, `\r`, `\n`, and request-smuggling payloads are rejected - verify that both `HttpRequestEncoder` and `RtspEncoder` are protected from setter-based bypasses ### Affected Area - `netty-codec-http` - `io.netty.handler.codec.http.DefaultHttpRequest` - `io.netty.handler.codec.http.DefaultFullHttpRequest` - `io.netty.handler.codec.http.HttpRequestEncoder` - `io.netty.handler.codec.rtsp.RtspEncoder`MEDIUM

    NVD: n/a

    RedHat: n/a

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
      CVE-2025-22227In some specific scenarios with chained redirects, Reactor Netty HTTP client leaks credentials. In order for this to happen, the HTTP client must have been explicitly configured to follow redirects.MEDIUM

      NVD: n/a

      RedHat: 6.1

      • 9.4.0
      • 9.3.4
      • 9.3.3
      • 9.3.2
      • 9.3.1
      • 8.2.3
      • 8.2.2
      • 8.2.1
      • 8.2.0
      • 8.1.3
      CVE-2025-48924Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.MEDIUM

      NVD: n/a

      RedHat: 3.7

      • 9.4.0
      • 9.3.4
      • 9.3.3
      • 9.3.2
      • 9.3.1
      • 8.3.3
      • 8.3.2
      • 8.3.1
      • 8.3.0
      • 8.2.3
      CVE-2026-34479The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. Two groups of users are affected: * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file. * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class. Users are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue. Note: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.MEDIUM

      NVD: n/a

      RedHat: 5.3

      • 9.4.0
      • 9.3.4
      • 9.3.3
      • 9.3.2
      • 9.3.1
        CVE-2025-68161The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property is set to true. This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions: * The attacker is able to intercept or redirect network traffic between the client and the log receiver. * The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured). Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue. As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.MEDIUM

        NVD: 4.8

        RedHat: 5.9

        • 9.4.0
        • 9.3.4
        • 9.3.3
        • 9.3.2
        • 9.3.1
          CVE-2026-34477The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the <Ssl> element. Although the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value. A network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met: * An SMTP, Socket, or Syslog appender is in use. * TLS is configured via a nested <Ssl> element. * The attacker can present a certificate issued by a CA trusted by the appender's configured trust store, or by the default Java trust store if none is configured. This issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.MEDIUM

          NVD: n/a

          RedHat: 6.8

          • 9.4.0
          • 9.3.4
          • 9.3.3
          • 9.3.2
          • 9.3.1
            CVE-2026-34480Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters. The impact depends on the StAX implementation in use: * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records. * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j's internal status logger. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.MEDIUM

            NVD: 7.5

            RedHat: 5.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
              CVE-2026-34478Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout , in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes. Two distinct issues affect users of stream-based syslog services who configure Rfc5424Layout directly: * The newLineEscape attribute was silently renamed, causing newline escaping to stop working for users of TCP framing (RFC 6587), exposing them to CRLF injection in log output. * The useTlsMessageFormat attribute was silently renamed, causing users of TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping. Users of the SyslogAppender are not affected, as its configuration attributes were not modified. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.MEDIUM

              NVD: 7.5

              RedHat: 5.8

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 9.1.5
              • 9.1.4
              • 9.1.3
              • 9.1.2
              • 9.1.1
              CVE-2026-7168cross-proxy Digest auth state leakMEDIUM

              NVD: n/a

              RedHat: n/a

              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-2219It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).MEDIUM

              NVD: n/a

              RedHat: n/a

              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-27135nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.MEDIUM

              NVD: n/a

              RedHat: 7.5

              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 9.3.0
              • 9.2.8
              • 9.4.0
              • 9.3.4
              • 8.18.2
              • 8.18.1
              • 8.18.0
              CVE-2026-5958When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file() performs two separate, non-atomic filesystem operations on the same path: 1. resolves symlink to its target and stores the resolved path for determining when output is written, 2. opens the original symlink path (not the resolved one) to read the file. Between these two calls there is a race window. If an attacker atomically replaces the symlink with a different target during that window, sed will: read content from the new (attacker-chosen) symlink target and write the processed result to the path recorded in step 1. This can lead to arbitrary file overwrite with attacker-controlled content in the context of the sed process. This issue was fixed in version 4.10.MEDIUM

              NVD: n/a

              RedHat: n/a

              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-45582GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.MEDIUM

              NVD: n/a

              RedHat: 5.6

              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-5704A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.MEDIUM

              NVD: 5.5

              RedHat: 5

              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-7962In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing the \r and \n UTF-8 characters to separate different messages.MEDIUM

              NVD: 7.5

              RedHat: 5.3

              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.0.5
              • 9.0.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-5588Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules), Legion of the Bouncy Castle Inc. BCPKIX-FIPS bcpkix on All (pkix modules). This vulnerability is associated with program files JcaContentVerifierProviderBuilder.Java. This issue affects BC-JAVA: from 1.67 before 1.84; BCPKIX-FIPS: from 2.0.6 before 2.0.11, from 2.1.7 before 2.1.11.MEDIUM

              NVD: n/a

              RedHat: 7.5

              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 9.3.0
              • 9.4.0
              • 8.19.15
              CVE-2026-0636Improper neutralization of special elements used in an LDAP query ('LDAP injection') vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcprov on all (prov modules). This vulnerability is associated with program files LDAPStoreHelper. This issue affects BC-JAVA: from 1.74 before 1.84.MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 9.3.0
              • 9.4.0
              • 8.19.15
              • 8.11.4
              • 8.11.3
              • 8.11.2
              CVE-2026-5121A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.MEDIUM

              NVD: n/a

              RedHat: 7.5

              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 9.3.0
              • 9.2.8
              • 9.4.0
              • 9.3.4
              • 8.19.15
              • 8.19.14
              • 8.19.13
              CVE-2026-3731A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.MEDIUM

              NVD: 7.5

              RedHat: 5.3

              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-14831A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.3.1
              • 9.3.0
              • 9.2.6
              • 9.2.5
              • 9.2.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.2.8
              CVE-2025-90861. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0915Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-14104A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.MEDIUM

              NVD: n/a

              RedHat: 6.1

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-11187Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For this reason the issue was assessed as Moderate severity. The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as PKCS#12 processing is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue. OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do not support PBMAC1 in PKCS#12.MEDIUM

              NVD: n/a

              RedHat: 6.1

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-69419Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.MEDIUM

              NVD: n/a

              RedHat: 7.4

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0964A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the user execute them under specific consequences. This is the same issue as in OpenSSH, tracked as CVE-2019-6111.MEDIUM

              NVD: 6.3

              RedHat: 5

              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 8.19.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0967A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.MEDIUM

              NVD: 5.5

              RedHat: 2.2

              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 8.19.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0968A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.MEDIUM

              NVD: 3.1

              RedHat: 3.1

              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 8.19.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-13601A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.MEDIUM

              NVD: n/a

              RedHat: 7.7

              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.2.1
              • 9.2.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-67735Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the URI. Any application / framework using `HttpRequestEncoder` can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 9.2.3
              • 9.2.2
              • 9.2.1
              • 9.2.0
              • 9.1.9
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-9714Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.MEDIUM

              NVD: 5.5

              RedHat: 6.2

              • 9.2.2
              • 9.2.1
              • 9.2.0
              • 9.1.8
              • 9.1.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-4598A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.MEDIUM

              NVD: n/a

              RedHat: 4.7

              • 9.2.2
              • 9.2.1
              • 9.2.0
              • 9.1.8
              • 9.1.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-68384Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) causing a persistent denial of service (OOM crash) via submission of oversized user settings data.MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 9.2.2
              • 9.2.1
              • 9.2.0
              • 9.1.8
              • 9.1.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-9230Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.MEDIUM

              NVD: n/a

              RedHat: 5.6

              • 9.2.1
              • 9.2.0
              • 9.1.7
              • 9.1.6
              • 9.1.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-68390Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.MEDIUM

              NVD: n/a

              RedHat: 4.9

              • 9.2.1
              • 9.2.0
              • 9.1.7
              • 9.1.6
              • 9.1.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-37731Improper Authentication in Elasticsearch PKI realm can lead to user impersonation via specially crafted client certificates. A malicious actor would need to have such a crafted client certificate signed by a legitimate, trusted Certificate Authority.MEDIUM

              NVD: 7.4

              RedHat: 7.4

              • 9.2.1
              • 9.2.0
              • 9.1.7
              • 9.1.6
              • 9.1.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-32988A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.MEDIUM

              NVD: 8.2

              RedHat: 6.5

              • 9.1.4
              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-32989A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.1.4
              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-32990A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.MEDIUM

              NVD: 8.2

              RedHat: 6.5

              • 9.1.4
              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-6395A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 9.1.4
              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-37727Insertion of sensitive information in log file in Elasticsearch can lead to loss of confidentiality under specific preconditions when auditing requests to the reindex API https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-reindexMEDIUM

              NVD: n/a

              RedHat: 5.7

              • 9.1.4
              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-8058The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.MEDIUM

              NVD: n/a

              RedHat: 4.2

              • 9.1.1
              • 9.1.0
              • 9.0.4
              • 9.0.3
              • 9.0.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-10963A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.MEDIUM

              NVD: n/a

              RedHat: 7.4

              • 8.19.4
              • 8.19.3
              • 8.19.2
              • 8.19.1
              • 8.19.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-58057Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.0.6
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-8885Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BC-FJA bc-fips on All allows Excessive Allocation. This vulnerability is associated with program files https://github.com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdenti... https://github.com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java . This issue affects BC Java: from 1.0 through 1.77; BC-FJA: from 1.0.0 through 1.0.2.5, from 2.0.0 through 2.0.1.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.0.6
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-8916Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.0.6
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-32414In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.MEDIUM

              NVD: 7.5

              RedHat: 5.6

              • 9.1.1
              • 9.1.0
              • 9.0.5
              • 9.0.4
              • 9.0.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-32415In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 9.1.1
              • 9.1.0
              • 9.0.5
              • 9.0.4
              • 9.0.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-40909Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit. The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6MEDIUM

              NVD: n/a

              RedHat: 5.9

              • 8.19.0
              • 8.18.4
              • 8.18.3
              • 8.17.9
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-31672Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.MEDIUM

              NVD: n/a

              RedHat: 4.4

              • 9.0.0
              • 8.18.0
              • 8.17.9
              • 8.17.8
              • 8.17.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-52533gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.MEDIUM

              NVD: n/a

              RedHat: 7

              • 9.0.3
              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-4373A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.MEDIUM

              NVD: n/a

              RedHat: 4.8

              • 9.0.3
              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-5702The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.MEDIUM

              NVD: n/a

              RedHat: 5.6

              • 9.0.3
              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-3576A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.MEDIUM

              NVD: n/a

              RedHat: 5.9

              • 9.0.3
              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 8.18.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-25724list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.MEDIUM

              NVD: 7.8

              RedHat: 4

              • 9.0.3
              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-6021A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.MEDIUM

              NVD: n/a

              RedHat: 7.5

              • 9.0.3
              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-4877There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.MEDIUM

              NVD: n/a

              RedHat: 4.5

              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-4878A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing failures or heap corruption.MEDIUM

              NVD: n/a

              RedHat: 3.6

              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-5318A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.MEDIUM

              NVD: 8.1

              RedHat: 8.1

              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-5351A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-5372A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.MEDIUM

              NVD: 8.8

              RedHat: 5

              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-5987A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.MEDIUM

              NVD: 8.1

              RedHat: 8.1

              • 8.18.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-4802Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).MEDIUM

              NVD: n/a

              RedHat: 7

              • 9.0.2
              • 9.0.1
              • 9.0.0
              • 8.18.2
              • 8.18.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-29088In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.18.1
              • 8.18.0
              • 8.17.7
              • 8.17.6
              • 8.17.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-12243A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.0.1
              • 9.0.0
              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-24528In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 9.0.1
              • 9.0.0
              • 8.17.3
              • 8.17.2
              • 8.17.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-12133A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 9.0.1
              • 9.0.0
              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-0395When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.MEDIUM

              NVD: n/a

              RedHat: 5.5

              • 9.0.0
              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 8.16.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-53864Connect2id Nimbus JOSE + JWT 10.0.x before 10.0.2 and 9.37.x before 9.37.4 allows a remote attacker to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of uncontrolled recursion. NOTE: this is independent of the Gson 2.11.0 issue because the Connect2id product could have checked the JSON object nesting depth, regardless of what limits (if any) were imposed by Gson.MEDIUM

              NVD: n/a

              RedHat: 5.8

              • 8.17.3
              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 8.16.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-25193Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 8.16.4
              • 8.16.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-3596RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.MEDIUM

              NVD: 9

              RedHat: 9

              • 8.17.1
              • 8.17.0
              • 8.16.3
              • 8.16.2
              • 8.16.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-29857An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 8.16.2
              • 8.16.1
              • 8.16.0
              • 8.15.5
              • 8.15.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-52979Uncontrolled Resource Consumption in Elasticsearch while evaluating specifically crafted search templates with Mustache functions can lead to Denial of Service by causing the Elasticsearch node to crash.MEDIUM

              NVD: 7.5

              RedHat: 4.3

              • 8.15.5
              • 8.15.4
              • 8.15.3
              • 8.15.2
              • 8.15.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-12539An issue was discovered where improper authorization controls affected certain queries that could allow a malicious actor to circumvent Document Level Security in Elasticsearch and get access to documents that their roles would normally not allow.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.16.1
              • 8.16.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-47535Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.MEDIUM

              NVD: n/a

              RedHat: 5.5

              • 8.16.0
              • 8.15.4
              • 8.15.3
              • 8.15.2
              • 8.15.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-8096When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.MEDIUM

              NVD: n/a

              RedHat: 6.5

              • 8.15.1
              • 8.15.0
              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-37370In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.15.0
              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-37371In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.MEDIUM

              NVD: 9.1

              RedHat: 6.5

              • 8.15.0
              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-52980A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. A successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them.MEDIUM

              NVD: n/a

              RedHat: n/a

              • 8.15.0
              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-52981An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow.MEDIUM

              NVD: 7.5

              RedHat: n/a

              • 8.15.0
              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-29025Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-25710Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.3 through 1.25.0. Users are recommended to upgrade to version 1.26.0 which fixes the issue.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-26308Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26. Users are recommended to upgrade to version 1.26, which fixes the issue.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-30171An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.MEDIUM

              NVD: n/a

              RedHat: 5.9

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-30172An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.MEDIUM

              NVD: n/a

              RedHat: 7.5

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-34447An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-33599nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

              NVD: n/a

              RedHat: 7.6

              • 8.13.4
              • 8.13.3
              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-33600nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 8.13.4
              • 8.13.3
              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-33601nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

              NVD: n/a

              RedHat: 4

              • 8.13.4
              • 8.13.3
              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-33602nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

              NVD: n/a

              RedHat: 4

              • 8.13.4
              • 8.13.3
              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-21742Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.MEDIUM

              NVD: 5.3

              RedHat: 5.6

              • 8.13.4
              • 8.13.3
              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-37280A flaw was discovered in Elasticsearch, affecting document ingestion when an index template contains a dynamic field mapping of “passthrough” type. Under certain circumstances, ingesting documents in this index would cause a StackOverflow exception to be thrown and ultimately lead to a Denial of Service. Note that passthrough fields is an experimental feature.MEDIUM

              NVD: 4.9

              RedHat: 4.9

              • 8.13.4
              • 8.13.3
              • 8.13.2
              • 8.13.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-28085wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.MEDIUM

              NVD: n/a

              RedHat: 4.4

              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 8.12.2
              • 8.12.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-2961The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.MEDIUM

              NVD: n/a

              RedHat: 8.8

              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 8.12.2
              • 8.12.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-28834A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 8.12.2
              • 8.12.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-28182nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.MEDIUM

              NVD: n/a

              RedHat: 5.3

              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 8.12.2
              • 8.12.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-43709An allocation of resources without limits or throttling in Elasticsearch can lead to an OutOfMemoryError exception resulting in a crash via a specially crafted query using an SQL function.MEDIUM

              NVD: 7.5

              RedHat: 6.5

              • 8.13.2
              • 8.13.1
              • 8.13.0
              • 8.12.2
              • 8.12.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-2398When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.MEDIUM

              NVD: n/a

              RedHat: 7.5

              • 8.13.0
              • 8.12.2
              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-23444It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.MEDIUM

              NVD: 7.5

              RedHat: n/a

              • 8.12.2
              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-23450A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash.MEDIUM

              NVD: 7.5

              RedHat: 4.9

              • 8.12.2
              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-23451Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue.MEDIUM

              NVD: 6.5

              RedHat: 4.4

              • 8.12.2
              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-0553A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-22365linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-6004A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.MEDIUM

              NVD: 4.8

              RedHat: 4.8

              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-6918A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.MEDIUM

              NVD: 5.3

              RedHat: 3.7

              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-15522Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.MEDIUM

              NVD: 5.9

              RedHat: 5.9

              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-45146An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-7104A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.MEDIUM

              NVD: 7.3

              RedHat: 7.3

              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48795The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.MEDIUM

              NVD: 5.9

              RedHat: 5.9

              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-39804In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.MEDIUM

              NVD: n/a

              RedHat: 3.3

              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-46218This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.MEDIUM

              NVD: 6.5

              RedHat: 5.3

              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-5981A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.MEDIUM

              NVD: 5.9

              RedHat: 5.9

              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-47038A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.MEDIUM

              NVD: 7.8

              RedHat: 7

              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-44483All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled. Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-49921An issue was discovered by Elastic whereby Watcher search input logged the search query results on DEBUG log level. This could lead to raw contents of documents stored in Elasticsearch to be printed in logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by removing this excessive logging. This issue only affects users that use Watcher and have a Watch defined that uses the search input and additionally have set the search input’s logger to DEBUG or finer, for example using: org.elasticsearch.xpack.watcher.input.search, org.elasticsearch.xpack.watcher.input, org.elasticsearch.xpack.watcher, or wider, since the loggers are hierarchical.MEDIUM

              NVD: 6.5

              RedHat: 5.2

              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-36054lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 8.10.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-23449An uncaught exception in Elasticsearch >= 8.4.0 and < 8.11.1 occurs when an encrypted PDF is passed to an attachment processor through the REST API. The Elasticsearch ingest node that attempts to parse the PDF file will crash. This does not happen with password-protected PDF files or with unencrypted PDF files.MEDIUM

              NVD: 5.3

              RedHat: 4.3

              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 8.10.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-46673It was identified that malformed scripts used in the script processor of an Ingest Pipeline could cause an Elasticsearch node to crash when calling the Simulate Pipeline API. MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.10.2
              • 8.10.1
              • 8.10.0
              • 8.9.2
              • 8.9.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-2976Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.MEDIUM

              NVD: 7.1

              RedHat: 4.4

              • 8.10.1
              • 8.10.0
              • 8.9.2
              • 8.9.1
              • 8.9.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-42503Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.This issue affects Apache Commons Compress: from 1.22 before 1.24.0. Users are recommended to upgrade to version 1.24.0, which fixes the issue. A third party can create a malformed TAR file by manipulating file modification times headers, which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption. In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision (issue # COMPRESS-612 [1]). The format for the PAX extended headers carrying this data consists of two numbers separated by a period [2], indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values. Parsing of these numbers uses the BigDecimal [3] class from the JDK which has a publicly known algorithmic complexity issue when doing operations on large numbers, causing denial of service (see issue # JDK-6560193 [4]). A third party can manipulate file time headers in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098 [5]. [1]: https://issues.apache.org/jira/browse/COMPRESS-612 [2]: https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05 [3]: https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html [4]: https://bugs.openjdk.org/browse/JDK-6560193 [5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098 Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.10.1
              • 8.10.0
              • 8.9.2
              • 8.9.1
              • 8.9.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-31417Elasticsearch generally filters out sensitive information and credentials before logging to the audit log. It was found that this filtering was not applied when requests to Elasticsearch use certain deprecated URIs for APIs. The impact of this flaw is that sensitive information such as passwords and tokens might be printed in cleartext in Elasticsearch audit logs. Note that audit logging is disabled by default and needs to be explicitly enabled and even when audit logging is enabled, request bodies that could contain sensitive information are not printed to the audit log unless explicitly configured.MEDIUM

              NVD: 4.4

              RedHat: 4.1

              • 8.9.1
              • 8.9.0
              • 8.8.2
              • 8.8.1
              • 8.8.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-31419A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.9.0
              • 8.8.2
              • 8.8.1
              • 8.8.0
              • 8.7.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-29425In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.MEDIUM

              NVD: 4.8

              RedHat: 4.8

              • 8.8.2
              • 8.8.1
              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-34462Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.8.2
              • 8.8.1
              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-11080In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.8.1
              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-1667A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.MEDIUM

              NVD: 6.5

              RedHat: 4.3

              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-2283A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.MEDIUM

              NVD: 6.5

              RedHat: 4.8

              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-2650Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-31484CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.MEDIUM

              NVD: 8.1

              RedHat: 7.4

              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-29491ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-23916An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-27535An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.MEDIUM

              NVD: 5.9

              RedHat: 5.9

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0361A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.MEDIUM

              NVD: 7.4

              RedHat: 7.4

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-36222ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-37750The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3821An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-4415A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-48303GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-30187Azure Storage Library Information Disclosure VulnerabilityMEDIUM

              NVD: 1.9

              RedHat: n/a

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-40152Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-41915Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.MEDIUM

              NVD: 6.5

              RedHat: n/a

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-31684Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.MEDIUM

              NVD: 4.3

              RedHat: 4.3

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-45142The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.MEDIUM

              NVD: 7.5

              RedHat: n/a

              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-42898PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."MEDIUM

              NVD: 8.8

              RedHat: 8.8

              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-4304A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.MEDIUM

              NVD: 5.9

              RedHat: 5.9

              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-4450The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0215The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-43552A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.MEDIUM

              NVD: 5.9

              RedHat: 5.9

              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-44758Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.MEDIUM

              NVD: 7.5

              RedHat: n/a

              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3437A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.MEDIUM

              NVD: 6.5

              RedHat: 5.9

              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-44640Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).MEDIUM

              NVD: 9.8

              RedHat: n/a

              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-41916Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue.MEDIUM

              NVD: 7.5

              RedHat: n/a

              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 8.4.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3171A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 8.4.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-23491Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.5.2
              • 8.5.1
              • 8.5.0
              • 8.4.3
              • 8.4.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-32221When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.MEDIUM

              NVD: 9.8

              RedHat: 4.8

              • 8.5.0
              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-35737SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.MEDIUM

              NVD: 7.5

              RedHat: 5.9

              • 8.5.0
              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3116The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.MEDIUM

              NVD: 7.5

              RedHat: n/a

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-16156CPAN 2.28 allows Signature Verification Bypass.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-37434zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).MEDIUM

              NVD: 9.8

              RedHat: 7

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-38749Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-38750Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-38751Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-38752Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-41854Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-35525In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 8.3.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-35527In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.MEDIUM

              NVD: 9.8

              RedHat: 8.1

              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 8.3.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2509A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-4166vim is vulnerable to Out-of-bounds ReadMEDIUM

              NVD: 7.1

              RedHat: 7.1

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-4192vim is vulnerable to Use After FreeMEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0213vim is vulnerable to Heap-based Buffer OverflowMEDIUM

              NVD: 6.6

              RedHat: 6.6

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0261Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0318Heap-based Buffer Overflow in vim/vim prior to 8.2.MEDIUM

              NVD: 9.8

              RedHat: 6.6

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0319Out-of-bounds Read in vim/vim prior to 8.2.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0351Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 6.6

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0359Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0361Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0368Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0392Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0408Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0413Use After Free in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0417Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0554Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0572Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0629Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0685Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0714Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0943Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1154Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1420Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.MEDIUM

              NVD: 5.5

              RedHat: 6.1

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1616Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote executionMEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1619Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote executionMEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1620NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.MEDIUM

              NVD: 7.5

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1621Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote executionMEDIUM

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1629Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote executionMEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1674NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1720Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.MEDIUM

              NVD: 7.8

              RedHat: 6.1

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1851Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1927Buffer Over-read in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1942Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 6.6

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1968Use After Free in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2000Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 5.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2042Use After Free in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2175Buffer Over-read in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2183Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 3.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2207Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2304Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2344Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2345Use After Free in GitHub repository vim/vim prior to 9.0.0046.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2571Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2923NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2946Use After Free in GitHub repository vim/vim prior to 9.0.0246.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2980NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3016Use After Free in GitHub repository vim/vim prior to 9.0.0286.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3037Use After Free in GitHub repository vim/vim prior to 9.0.0322.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3099Use After Free in GitHub repository vim/vim prior to 9.0.0360.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3234Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3256Use After Free in GitHub repository vim/vim prior to 9.0.0530.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3324Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3705A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.MEDIUM

              NVD: 7.5

              RedHat: 7

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-47024A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0049Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.MEDIUM

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0054Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0288Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.MEDIUM

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0433Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-1170Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.MEDIUM

              NVD: 6.6

              RedHat: 5.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-1175Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.MEDIUM

              NVD: 6.6

              RedHat: 5.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-1264NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-2609NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-2610Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.MEDIUM

              NVD: 7.8

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-46246Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.MEDIUM

              NVD: 5.5

              RedHat: 4

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4733Use After Free in GitHub repository vim/vim prior to 9.0.1840.MEDIUM

              NVD: 7.8

              RedHat: 7

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4735Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.MEDIUM

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4750Use After Free in GitHub repository vim/vim prior to 9.0.1857.MEDIUM

              NVD: 7.8

              RedHat: 7

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4751Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4752Use After Free in GitHub repository vim/vim prior to 9.0.1858.MEDIUM

              NVD: 7.8

              RedHat: 7

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4781Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.MEDIUM

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48231Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.MEDIUM

              NVD: 4.3

              RedHat: 4.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-5344Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.MEDIUM

              NVD: 7.5

              RedHat: 5.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-5441NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-5535Use After Free in GitHub repository vim/vim prior to v9.0.2010.MEDIUM

              NVD: 7.8

              RedHat: 3.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-41957Vim is an open source command line text editor. Vim < v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647MEDIUM

              NVD: 5.3

              RedHat: 4.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-43374The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.MEDIUM

              NVD: 4.7

              RedHat: 3.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-43802Vim is an improved version of the unix vi text editor. When flushing the typeahead buffer, Vim moves the current position in the typeahead buffer but does not check whether there is enough space left in the buffer to handle the next characters. So this may lead to the tb_off position within the typebuf variable to point outside of the valid buffer size, which can then later lead to a heap-buffer overflow in e.g. ins_typebuf(). Therefore, when flushing the typeahead buffer, check if there is enough space left before advancing the off position. If not, fall back to flush current typebuf contents. It's not quite clear yet, what can lead to this situation. It seems to happen when error messages occur (which will cause Vim to flush the typeahead buffer) in comnination with several long mappgins and so it may eventually move the off position out of a valid buffer size. Impact is low since it is not easily reproducible and requires to have several mappings active and run into some error condition. But when this happens, this will cause a crash. The issue has been fixed as of Vim patch v9.1.0697. Users are advised to upgrade. There are no known workarounds for this issue.MEDIUM

              NVD: n/a

              RedHat: 4.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-22134When switching to other buffers using the :all command and visual mode still being active, this may cause a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try to access a position if the position is greater than the corresponding buffer line. Impact is medium since the user must have switched on visual mode when executing the :all ex command. The Vim project would like to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch v9.1.1003MEDIUM

              NVD: 5.5

              RedHat: 4.2

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-24014Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043.MEDIUM

              NVD: 5.5

              RedHat: 4.2

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-26603Vim is a greatly improved version of the good old UNIX editor Vi. Vim allows to redirect screen messages using the `:redir` ex command to register, variables and files. It also allows to show the contents of registers using the `:registers` or `:display` ex command. When redirecting the output of `:display` to a register, Vim will free the register content before storing the new content in the register. Now when redirecting the `:display` command to a register that is being displayed, Vim will free the content while shortly afterwards trying to access it, which leads to a use-after-free. Vim pre 9.1.1115 checks in the ex_display() function, that it does not try to redirect to a register while displaying this register at the same time. However this check is not complete, and so Vim does not check the `+` and `*` registers (which typically donate the X11/clipboard registers, and when a clipboard connection is not possible will fall back to use register 0 instead. In Patch 9.1.1115 Vim will therefore skip outputting to register zero when trying to redirect to the clipboard registers `*` or `+`. Users are advised to upgrade. There are no known workarounds for this vulnerability.MEDIUM

              NVD: n/a

              RedHat: 4.2

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-24823Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-13956Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.MEDIUM

              NVD: 5.3

              RedHat: 5.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-34903GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.MEDIUM

              NVD: 6.5

              RedHat: 5.9

              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 8.2.2
              • 8.2.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2097AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).MEDIUM

              NVD: 5.3

              RedHat: 5.3

              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 8.2.2
              • 8.2.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-32206curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.3.0
              • 8.2.3
              • 8.2.2
              • 8.2.1
              • 8.2.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-32208When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.MEDIUM

              NVD: 5.9

              RedHat: 5.3

              • 8.3.0
              • 8.2.3
              • 8.2.2
              • 8.2.1
              • 8.2.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2068In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).MEDIUM

              NVD: 7.3

              RedHat: 6.7

              • 8.2.3
              • 8.2.2
              • 8.2.1
              • 8.2.0
              • 8.1.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-49128Jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage.MEDIUM

              NVD: n/a

              RedHat: 4

              • 8.2.3
              • 8.2.2
              • 8.2.1
              • 8.2.0
              • 8.1.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1664Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.MEDIUM

              NVD: 9.8

              RedHat: n/a

              • 8.2.2
              • 8.2.1
              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1304An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.MEDIUM

              NVD: 7.8

              RedHat: 5.8

              • 8.2.2
              • 8.2.1
              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-22576An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).MEDIUM

              NVD: 8.1

              RedHat: 8.1

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-27774An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.MEDIUM

              NVD: 5.7

              RedHat: 5

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-27782libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.MEDIUM

              NVD: 7.5

              RedHat: 7.5

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-29155In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.MEDIUM

              NVD: 9.8

              RedHat: 6.5

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1292The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).MEDIUM

              NVD: 7.3

              RedHat: 6.7

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1271An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.MEDIUM

              NVD: 8.8

              RedHat: 8.8

              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2018-25032zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.MEDIUM

              NVD: 7.5

              RedHat: 8.2

              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-3999A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.MEDIUM

              NVD: 7.8

              RedHat: 7.4

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-43797Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.MEDIUM

              NVD: 6.5

              RedHat: 6.5

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-3995A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.MEDIUM

              NVD: 5.5

              RedHat: 4.7

              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-3996A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.MEDIUM

              NVD: 5.5

              RedHat: 5.5

              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-11053When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-7264libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.LOW

              NVD: 6.5

              RedHat: 5.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-9681When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.LOW

              NVD: 6.5

              RedHat: 3.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-14524When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.LOW

              NVD: n/a

              RedHat: 6.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.18.2
              • 8.18.1
              CVE-2025-14819When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.LOW

              NVD: n/a

              RedHat: 6.8

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.18.2
              • 8.18.1
              CVE-2025-15079When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.LOW

              NVD: n/a

              RedHat: 8.1

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.18.2
              • 8.18.1
              CVE-2025-15224When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.LOW

              NVD: n/a

              RedHat: 4.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.18.2
              • 8.18.1
              CVE-2026-6276A flaw was found in libcurl. This vulnerability allows for information disclosure when a custom `Host:` header is used in an initial HTTP request, and a subsequent request reuses the same connection without specifying a new `Host:` header. This can lead to libcurl incorrectly sending cookies intended for the first host to the second host, resulting in a cookie leak. This issue is categorized as an Origin Validation Error (CWE-346). Exploitation typically requires specific debugging configurations.LOW

              NVD: n/a

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.18.2
              • 8.18.1
              • 8.18.0
              • 8.17.8
              • 8.17.7
              CVE-2023-4156A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.LOW

              NVD: 7.1

              RedHat: 6.1

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2023-32636A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.LOW

              NVD: 7.5

              RedHat: 6.2

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-3360A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.LOW

              NVD: n/a

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-7039A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.LOW

              NVD: n/a

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-0988A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).LOW

              NVD: n/a

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-1485A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.LOW

              NVD: n/a

              RedHat: 2.8

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-4438Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.LOW

              NVD: n/a

              RedHat: 4

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.18.2
              • 8.18.1
              • 8.18.0
              • 8.17.8
              • 8.17.7
              CVE-2022-3219GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.LOW

              NVD: 3.3

              RedHat: 6.2

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-30258In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."LOW

              NVD: 4.7

              RedHat: 2.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-24883In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).LOW

              NVD: 5.5

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-3832A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.LOW

              NVD: n/a

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-1632A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.LOW

              NVD: 5.5

              RedHat: 3.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-5915A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.LOW

              NVD: 6.6

              RedHat: 6.6

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-5916A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.LOW

              NVD: 5.6

              RedHat: 3.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-5917A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.LOW

              NVD: 5

              RedHat: 2.8

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-5918A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.LOW

              NVD: 6.6

              RedHat: 3.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2022-27943libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.LOW

              NVD: 5.5

              RedHat: 5.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-41990Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.LOW

              NVD: n/a

              RedHat: 3.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-11961pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.LOW

              NVD: n/a

              RedHat: 1.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-13151Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2023-45322libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."LOW

              NVD: 6.5

              RedHat: 5.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-34459An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.LOW

              NVD: n/a

              RedHat: 5.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-27113libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.LOW

              NVD: 7.5

              RedHat: 3.1

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-6170A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.LOW

              NVD: 2.5

              RedHat: 2.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-0989A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.LOW

              NVD: n/a

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-0992A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.LOW

              NVD: n/a

              RedHat: 2.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2023-50495NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().LOW

              NVD: 6.5

              RedHat: 6.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-2673Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to interpolate the built-in default group list into its own configuration, perhaps adding or removing specific elements, then an implementation defect causes the 'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups were treated as a single sufficiently secure 'tuple', with the server not sending a Hello Retry Request (HRR) even when a group in a more preferred tuple was mutually supported. As a result, the client and server might fail to negotiate a mutually supported post-quantum key agreement group, such as 'X25519MLKEM768', if the client's configuration results in only 'classical' groups (such as 'X25519' being the only ones in the client's initial keyshare prediction). OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS 1.3 key agreement group on TLS servers. The old syntax had a single 'flat' list of groups, and treated all the supported groups as sufficiently secure. If any of the keyshares predicted by the client were supported by the server the most preferred among these was selected, even if other groups supported by the client, but not included in the list of predicted keyshares would have been more preferred, if included. The new syntax partitions the groups into distinct 'tuples' of roughly equivalent security. Within each tuple the most preferred group included among the client's predicted keyshares is chosen, but if the client supports a group from a more preferred tuple, but did not predict any corresponding keyshares, the server will ask the client to retry the ClientHello (by issuing a Hello Retry Request or HRR) with the most preferred mutually supported group. The above works as expected when the server's configuration uses the built-in default group list, or explicitly defines its own list by directly defining the various desired groups and group 'tuples'. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.LOW

              NVD: n/a

              RedHat: 3.1

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-13176Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.LOW

              NVD: n/a

              RedHat: 4.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-41996Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-9232Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summary: An out-of-bounds read can trigger a crash which leads to Denial of Service for an application. The OpenSSL HTTP client API functions can be used directly by applications but they are also used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker. In this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user has to have a 'no_proxy' environment variable set. For the aforementioned reasons the issue was assessed as Low severity. The vulnerable code was introduced in the following patch releases: 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary.LOW

              NVD: n/a

              RedHat: 3.1

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-28387Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side. Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage. By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as 'unusable' any TLSA records that have the PKIX certificate usages. These SMTP (or other similar) clients are not vulnerable to this issue. Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable. The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records. No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.LOW

              NVD: 8.1

              RedHat: 3.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.18.2
              • 8.18.1
              • 8.18.0
              • 8.17.8
              CVE-2026-28388Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing. Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application. When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference. Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.LOW

              NVD: 7.5

              RedHat: 5.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.18.2
              • 8.18.1
              • 8.18.0
              • 8.17.8
              CVE-2026-28389Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.LOW

              NVD: 7.5

              RedHat: 5.9

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.18.2
              • 8.18.1
              • 8.18.0
              • 8.17.8
              CVE-2026-31789Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms. Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior. If an attacker can supply a crafted X.509 certificate with an excessively large OCTET STRING value in extensions such as the Subject Key Identifier (SKID) or Authority Key Identifier (AKID) which are being converted to hex, the size of the buffer needed for the result is calculated as multiplication of the input length by 3. On 32 bit platforms, this multiplication may overflow resulting in the allocation of a smaller buffer and a heap buffer overflow. Applications and services that print or log contents of untrusted X.509 certificates are vulnerable to this issue. As the certificates would have to have sizes of over 1 Gigabyte, printing or logging such certificates is a fairly unlikely operation and only 32 bit platforms are affected, this issue was assigned Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.LOW

              NVD: 9.8

              RedHat: 5.8

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.18.2
              • 8.18.1
              • 8.18.0
              • 8.17.8
              CVE-2022-41409Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.LOW

              NVD: 7.5

              RedHat: 5.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-0232A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.LOW

              NVD: 5.5

              RedHat: 4.7

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2025-70873An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.LOW

              NVD: n/a

              RedHat: 3.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2021-4217A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.LOW

              NVD: 3.3

              RedHat: 3.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2022-0529A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.LOW

              NVD: 5.5

              RedHat: 5.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2022-0530A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.LOW

              NVD: 5.5

              RedHat: 5.5

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2026-27171zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.LOW

              NVD: 5.5

              RedHat: 3.3

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              CVE-2024-2236A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.LOW

              NVD: n/a

              RedHat: 5.9

              • 8.19.15
              • 8.19.14
              • 8.19.13
              • 8.19.12
              • 8.19.11
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-56433shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.LOW

              NVD: n/a

              RedHat: 3.6

              • 9.2.1
              • 9.2.0
              • 9.1.7
              • 9.1.6
              • 9.1.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-9820A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.LOW

              NVD: n/a

              RedHat: 4

              • 9.3.1
              • 9.3.0
              • 9.2.6
              • 9.2.5
              • 9.2.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.2.8
              CVE-2025-0167When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `default` entry that omits both login and password. A rare circumstance.LOW

              NVD: n/a

              RedHat: n/a

              • 8.19.12
              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-10148curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.LOW

              NVD: n/a

              RedHat: 4.8

              • 8.19.12
              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-15281Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0861Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.LOW

              NVD: n/a

              RedHat: 8.1

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-15468Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-15469Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the full message using library APIs will reject the signature, so the risk primarily affects workflows that both sign and verify with the affected 'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and library users are unaffected. The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the command-line tools are outside the OpenSSL FIPS module boundary. OpenSSL 3.5 and 3.6 are vulnerable to this issue. OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.LOW

              NVD: n/a

              RedHat: 5.5

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-66199Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (brotli, zlib, or zstd) is available, and where the compression extension is negotiated. Both clients receiving a server CompressedCertificate and servers in mutual TLS scenarios receiving a client CompressedCertificate are affected. Servers that do not request client certificates are not vulnerable to client-initiated attacks. Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION to disable receiving compressed certificates. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the TLS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-68160Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.LOW

              NVD: n/a

              RedHat: 4.7

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-69418Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue.LOW

              NVD: n/a

              RedHat: 4

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-69420Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-69421Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.LOW

              NVD: 7.5

              RedHat: 6.5

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-22795Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read. The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.LOW

              NVD: n/a

              RedHat: 5.5

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-22796Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.LOW

              NVD: n/a

              RedHat: 5.9

              • 9.3.0
              • 9.2.5
              • 9.2.4
              • 9.2.3
              • 9.2.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-8277A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.LOW

              NVD: n/a

              RedHat: 3.1

              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 8.19.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0965A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.LOW

              NVD: n/a

              RedHat: 3.3

              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 8.19.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2026-0966The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.LOW

              NVD: 8.2

              RedHat: 6.5

              • 8.19.11
              • 8.19.10
              • 8.19.9
              • 8.19.8
              • 8.19.7
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-8114A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.LOW

              NVD: 4.7

              RedHat: 4.7

              • 8.19.6
              • 8.19.5
              • 8.19.4
              • 8.19.3
              • 8.19.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-6297It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.LOW

              NVD: n/a

              RedHat: n/a

              • 8.19.4
              • 8.19.3
              • 8.19.2
              • 8.19.1
              • 8.19.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2025-58056Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.LOW

              NVD: 7.5

              RedHat: 7.5

              • 9.1.3
              • 9.1.2
              • 9.1.1
              • 9.1.0
              • 9.0.6
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-29458ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.LOW

              NVD: 7.1

              RedHat: 6.1

              • 9.1.1
              • 9.1.0
              • 9.0.4
              • 9.0.3
              • 9.0.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-26458Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.LOW

              NVD: n/a

              RedHat: 5.9

              • 8.17.3
              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 8.16.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-26461Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.LOW

              NVD: n/a

              RedHat: 5.9

              • 8.17.3
              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 8.16.5
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-9143Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we're aware of, either only "named curves" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can't represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an "exotic" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with "exotic" explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.LOW

              NVD: n/a

              RedHat: 3.7

              • 8.17.2
              • 8.17.1
              • 8.17.0
              • 8.16.4
              • 8.16.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-2511Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.LOW

              NVD: n/a

              RedHat: 3.7

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-4741Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use. The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use. While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.LOW

              NVD: n/a

              RedHat: 5.6

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-5535Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a "no overlap" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.LOW

              NVD: n/a

              RedHat: 5.9

              • 8.14.3
              • 8.14.2
              • 8.14.1
              • 8.14.0
              • 8.13.4
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-5678Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.LOW

              NVD: 5.3

              RedHat: 5.3

              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-0727Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4641A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.LOW

              NVD: 5.5

              RedHat: 4.7

              • 8.12.1
              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-2953A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.LOW

              NVD: 7.5

              RedHat: 7.1

              • 8.12.0
              • 8.11.4
              • 8.11.3
              • 8.11.2
              • 8.11.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4806A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.LOW

              NVD: 5.9

              RedHat: 5.9

              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4813A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.LOW

              NVD: 5.9

              RedHat: 5.9

              • 8.11.2
              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-4016Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.11.1
              • 8.11.0
              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-3446Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.LOW

              NVD: 5.3

              RedHat: 5.3

              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 8.10.1
              • 8.10.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-3817Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.LOW

              NVD: 5.3

              RedHat: 5.3

              • 8.10.4
              • 8.10.3
              • 8.10.2
              • 8.10.1
              • 8.10.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-38546This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.LOW

              NVD: 3.7

              RedHat: 3.7

              • 8.10.3
              • 8.10.2
              • 8.10.1
              • 8.10.0
              • 8.9.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-8908A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.10.1
              • 8.10.0
              • 8.9.2
              • 8.9.1
              • 8.9.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-28321An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.LOW

              NVD: 5.9

              RedHat: 5.9

              • 8.8.2
              • 8.8.1
              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-28322An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.LOW

              NVD: 3.7

              RedHat: 3.7

              • 8.8.2
              • 8.8.1
              • 8.8.0
              • 8.7.1
              • 8.7.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-39537An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.LOW

              NVD: 8.8

              RedHat: 5.5

              • 8.7.1
              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0464A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.LOW

              NVD: 7.5

              RedHat: 5.9

              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0465Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.LOW

              NVD: 5.3

              RedHat: 5.3

              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-0466The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.LOW

              NVD: 5.3

              RedHat: 5.3

              • 8.7.0
              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-27533A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.LOW

              NVD: 8.8

              RedHat: 4.3

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-27534A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.LOW

              NVD: 8.8

              RedHat: 3.7

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-27536An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.LOW

              NVD: 5.9

              RedHat: 5.9

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-27538An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.6.2
              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-28321The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.LOW

              NVD: 9.8

              RedHat: 9.8

              • 8.6.1
              • 8.6.0
              • 8.5.3
              • 8.5.2
              • 8.5.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-3671A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.LOW

              NVD: 6.5

              RedHat: 6.5

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-43618GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.LOW

              NVD: 7.5

              RedHat: 6.2

              • 8.4.3
              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1586An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.LOW

              NVD: 9.1

              RedHat: 7.5

              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 8.3.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1587An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.LOW

              NVD: 9.1

              RedHat: 7.5

              • 8.4.2
              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 8.3.2
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-35252When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.LOW

              NVD: 3.7

              RedHat: 3.1

              • 8.4.1
              • 8.4.0
              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-4209A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.LOW

              NVD: 6.5

              RedHat: 6.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-4193vim is vulnerable to Out-of-bounds ReadLOW

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0443Use After Free in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-0729Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.LOW

              NVD: 8.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1725NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1733Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.LOW

              NVD: 7.8

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1735Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.LOW

              NVD: 7.8

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1771Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1785Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.LOW

              NVD: 7.8

              RedHat: 7.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1796Use After Free in GitHub repository vim/vim prior to 8.2.4979.LOW

              NVD: 7.8

              RedHat: 6.6

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1897Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-1898Use After Free in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2124Buffer Over-read in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2125Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2126Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2129Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2206Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2208NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.LOW

              NVD: 5.5

              RedHat: 3.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2210Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2257Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2264Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.8

              RedHat: 3.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2284Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2285Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2286Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2287Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.1

              RedHat: 7.1

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2289Use After Free in GitHub repository vim/vim prior to 9.0.LOW

              NVD: 7.8

              RedHat: 4.4

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2581Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2598Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2845Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.LOW

              NVD: 7.8

              RedHat: 2.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-2849Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.LOW

              NVD: 7.8

              RedHat: 2.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3352Use After Free in GitHub repository vim/vim prior to 9.0.0614.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3520Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.LOW

              NVD: 9.8

              RedHat: 9.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-3591Use After Free in GitHub repository vim/vim prior to 9.0.0789.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-4292Use After Free in GitHub repository vim/vim prior to 9.0.0882.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-4293Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48233Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

              NVD: 4.3

              RedHat: 4.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48234Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

              NVD: 4.3

              RedHat: 4.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48235Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

              NVD: 4.3

              RedHat: 4.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48236Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

              NVD: 4.3

              RedHat: 4.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2023-48237Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

              NVD: 4.3

              RedHat: 4.3

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-22667Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.LOW

              NVD: 7.8

              RedHat: 8.4

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2024-47814Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

              NVD: 4.7

              RedHat: 3.9

              • 8.3.3
              • 8.3.2
              • 8.3.1
              • 8.3.0
              • 8.2.3
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-27775An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.LOW

              NVD: 7.5

              RedHat: 7.5

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-27776A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.LOW

              NVD: 6.5

              RedHat: 4.3

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-27781libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.LOW

              NVD: 7.5

              RedHat: 7.5

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2019-20838libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.LOW

              NVD: 7.5

              RedHat: 7.5

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-14155libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.LOW

              NVD: 5.3

              RedHat: 5.3

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-36084The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-36085The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-36086The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-36087The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-36690A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.LOW

              NVD: 7.5

              RedHat: n/a

              • 8.2.0
              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2019-18276An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.LOW

              NVD: 7.8

              RedHat: 7.8

              • 8.1.3
              • 8.1.2
              • 8.1.1
              • 8.1.0
              • 8.0.1
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-20193A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.LOW

              NVD: 3.3

              RedHat: 3.3

              • 8.1.0
              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2016-10228The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.LOW

              NVD: 5.9

              RedHat: 3.3

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2019-25013The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.LOW

              NVD: 5.9

              RedHat: 4.8

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-27618The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.LOW

              NVD: 5.5

              RedHat: 5.5

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-29562The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.LOW

              NVD: 4.8

              RedHat: 4.8

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2020-6096An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.LOW

              NVD: 8.1

              RedHat: 8.1

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-27645The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.LOW

              NVD: 2.5

              RedHat: 2.5

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-3326The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.LOW

              NVD: 7.5

              RedHat: 7.5

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2021-35942The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.LOW

              NVD: 9.1

              RedHat: 9.1

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-23218The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.LOW

              NVD: 9.8

              RedHat: 7

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
              CVE-2022-23219The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.LOW

              NVD: 9.8

              RedHat: 7

              • 8.0.1
              • 8.0.0
              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1