Red Hat Codeready Linux Builder for Power Little Endian 9.0 Ppc64le

CPE Details

Red Hat Codeready Linux Builder for Power Little Endian 9.0 Ppc64le
9.0_ppc64le
2023-10-25
03h38 +00:00
2023-10-25
03h38 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

codeready_linux_builder_for_power_little_endian

Version

9.0_ppc64le

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-3155 2025-04-03 13h34 +00:00 A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.
7.4
Haute
CVE-2023-4641 2023-12-27 15h43 +00:00 A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
5.5
Moyen
CVE-2023-5633 2023-10-23 21h58 +00:00 The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
7.8
Haute
CVE-2023-4911 2023-10-03 17h25 +00:00 A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
7.8
Haute