Redhat

Satellite

228 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Veröffentlicht 23.04.2019 19:32:50
  • Zuletzt bearbeitet 21.11.2024 04:41:11

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unau...

  • EPSS 0.4%
  • Veröffentlicht 23.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:31

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer cert...

  • EPSS 1.53%
  • Veröffentlicht 19.04.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:43

In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a method to execute past the end of bytecode array causing crashes. Eclipse OpenJ9 v0.14.0 correctly detects this case and rejects the attempted class load.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 15.04.2019 12:31:42
  • Zuletzt bearbeitet 21.11.2024 04:42:48

It was discovered that a world-readable log file belonging to Candlepin component of Red Hat Satellite 6.4 leaked the credentials of the Candlepin database. A malicious user with local access to a Satellite host can use those credentials to modify th...

  • EPSS 0.18%
  • Veröffentlicht 11.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:41

A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host regi...

  • EPSS 0.38%
  • Veröffentlicht 09.04.2019 16:29:02
  • Zuletzt bearbeitet 21.11.2024 04:42:48

In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resou...

Exploit
  • EPSS 0.78%
  • Veröffentlicht 11.02.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:24

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly ...

  • EPSS 0.72%
  • Veröffentlicht 11.02.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:25

In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.

Exploit
  • EPSS 0.57%
  • Veröffentlicht 04.02.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:48:00

png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.

  • EPSS 0.35%
  • Veröffentlicht 22.01.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:32

An improper authorization flaw was found in the Smart Class feature of Foreman. An attacker can use it to change configuration of any host registered in Red Hat Satellite, independent of the organization the host belongs to. This flaw affects all Red...