Redhat

Enterprise Linux Hpc Node

146 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 19.01.2017 20:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.

  • EPSS 0.07%
  • Veröffentlicht 22.12.2016 21:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted ...

  • EPSS 0.32%
  • Veröffentlicht 14.12.2016 22:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

XRegion in TigerVNC allows remote VNC servers to cause a denial of service (NULL pointer dereference) by leveraging failure to check a malloc return value, a similar issue to CVE-2014-6052.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 13.10.2016 14:59:14
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled...

  • EPSS 0.25%
  • Veröffentlicht 21.09.2016 14:25:29
  • Zuletzt bearbeitet 12.04.2025 10:46:40

libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted gzip file.

Exploit
  • EPSS 2.48%
  • Veröffentlicht 21.09.2016 14:25:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.

Exploit
  • EPSS 5.22%
  • Veröffentlicht 21.09.2016 14:25:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.

  • EPSS 2.26%
  • Veröffentlicht 21.09.2016 14:25:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.

Exploit
  • EPSS 2.34%
  • Veröffentlicht 21.09.2016 14:25:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.

Exploit
  • EPSS 1.77%
  • Veröffentlicht 21.09.2016 14:25:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buf...