Redhat

Enterprise Linux Aus

44 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.88%
  • Veröffentlicht 11.06.2018 21:29:12
  • Zuletzt bearbeitet 21.11.2024 03:32:47

Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name. This vulnerability affects Thunderbird < 52.5.2.

Exploit
  • EPSS 1.6%
  • Veröffentlicht 11.06.2018 21:29:11
  • Zuletzt bearbeitet 21.11.2024 03:32:45

It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbir...

  • EPSS 12.61%
  • Veröffentlicht 11.06.2018 21:29:11
  • Zuletzt bearbeitet 21.11.2024 03:32:44

A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. Thi...

  • EPSS 2.14%
  • Veröffentlicht 11.06.2018 21:29:02
  • Zuletzt bearbeitet 21.11.2024 03:01:58

HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vul...

  • EPSS 0.76%
  • Veröffentlicht 16.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:04

In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will h...

  • EPSS 27.64%
  • Veröffentlicht 19.08.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel q...

Warnung Exploit
  • EPSS 94.25%
  • Veröffentlicht 10.11.2016 21:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in Oc...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 09.01.2015 21:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the ...

  • EPSS 0.13%
  • Veröffentlicht 09.01.2015 21:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 01.03.2013 12:37:53
  • Zuletzt bearbeitet 11.04.2025 00:51:21

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.