Common Vulnerabilities and Exposures (CVE)

CVE-2024-5148

Jul 5, 2025 04:47:44 UTC

A flaw was found in the gnome-remote-desktop package. The gnome-remote-desktop system daemon performs inadequate validation of session agents using D-Bus methods related to transitioning a client connection from the login screen to the user...

CVE-2024-11079

Jul 5, 2025 04:45:02 UTC

A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data ...

CVE-2024-11029

Jul 5, 2025 04:44:45 UTC

A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl. As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative user credentials, including the adm...

CVE-2024-31083

Jul 5, 2025 02:32:51 UTC

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entri...

CVE-2024-31082

Jul 5, 2025 02:32:37 UTC

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation f...

CVE-2024-31081

Jul 5, 2025 02:32:17 UTC

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation fa...

CVE-2024-31080

Jul 5, 2025 02:32:03 UTC

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation fa...

CVE-2024-3657

Jul 5, 2025 02:30:23 UTC

A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service

CVE-2024-3183

Jul 5, 2025 02:30:08 UTC

A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is en...

CVE-2024-3094

Jul 5, 2025 02:25:44 UTC

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the sour...

CVE-2024-3019

Jul 5, 2025 02:25:29 UTC

A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is runn...

CVE-2024-1488

Jul 5, 2025 02:24:56 UTC

A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the co...

CVE-2024-9632

Jul 5, 2025 02:21:17 UTC

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local ...

CVE-2024-9050

Jul 5, 2025 02:19:14 UTC

A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value forma...

CVE-2024-10963

Jul 5, 2025 02:07:37 UTC

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. ...