- Home
- CVEs with nessus.description==An+update+is+now+available+for+Red+Hat+Enterprise+Linux+7.%0A%0ARed+Hat+Product+Security+has+rated+this+update+as+having+a+security+impact+of+Moderate.+A+Common+Vulnerability+Scoring+System+%28CVSS%29+base+score%2C+which+gives+a+detailed+severity+rating%2C+is+available+for+each+vulnerability+from+the+CVE+link%28s%29+in+the+References+section.%0A%0AGNOME+is+the+default+desktop+environment+of+Red+Hat+Enterprise+Linux.%0A%0ASecurity+Fix%28es%29+%3A%0A%0A%2A+libsoup%3A+Crash+in+soup_cookie_jar.c%3Aget_cookies%28%29+on+empty+hostnames+%28CVE-2018-12910%29%0A%0A%2A+poppler%3A+Infinite+recursion+in+fofi%2FFoFiType1C.cc%3AFoFiType1C%3A%3AcvtGlyph%28%29+function+allows+denial+of+service+%28CVE-2017-18267%29%0A%0A%2A+libgxps%3A+heap+based+buffer+over+read+in+ft_font_face_hash+function+of+gxps-fonts.c+%28CVE-2018-10733%29%0A%0A%2A+libgxps%3A+Stack-based+buffer+overflow+in+calling+glib+in+gxps_images_guess_content_type+of+gcontenttype.c+%28CVE-2018-10767%29%0A%0A%2A+poppler%3A+NULL+pointer+dereference+in+Annot.h%3AAnnotPath%3A%3AgetCoordsLength%28%29+allows+for+denial+of+service+via+crafted+PDF+%28CVE-2018-10768%29%0A%0A%2A+poppler%3A+out+of+bounds+read+in+pdfunite+%28CVE-2018-13988%29%0A%0AFor+more+details+about+the+security+issue%28s%29%2C+including+the+impact%2C+a+CVSS+score%2C+and+other+related+information%2C+refer+to+the+CVE+page%28s%29+listed+in+the+References+section.%0A%0ARed+Hat+would+like+to+thank+chenyuan+%28NESA+Lab%29+for+reporting+CVE-2018-10733+and+CVE-2018-10767+and+Hosein+Askari+for+reporting+CVE-2018-13988.%0A%0AAdditional+Changes+%3A%0A%0AFor+detailed+information+on+changes+in+this+release%2C+see+the+Red+Hat+Enterprise+Linux+7.6+Release+Notes+linked+from+the+References+section
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top