Redhat

Enterprise Linux Desktop

1928 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 27.18%
  • Published 13.03.2018 16:29:00
  • Last modified 21.11.2024 03:59:04

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls c...

  • EPSS 0.07%
  • Published 12.03.2018 21:29:01
  • Last modified 21.11.2024 04:12:53

Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when up...

  • EPSS 0.3%
  • Published 12.03.2018 15:29:00
  • Last modified 21.11.2024 03:01:29

JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.

Exploit
  • EPSS 2.08%
  • Published 12.03.2018 02:29:00
  • Last modified 21.11.2024 02:18:37

The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteS...

Exploit
  • EPSS 0.48%
  • Published 09.03.2018 20:29:00
  • Last modified 21.11.2024 03:01:28

JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.

  • EPSS 0.07%
  • Published 09.03.2018 15:29:00
  • Last modified 21.11.2024 03:59:07

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.

  • EPSS 6.85%
  • Published 07.03.2018 13:29:00
  • Last modified 21.11.2024 03:59:04

An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially ...

Exploit
  • EPSS 0.08%
  • Published 07.03.2018 08:29:00
  • Last modified 21.11.2024 04:12:38

The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages syste...

  • EPSS 0.44%
  • Published 06.03.2018 20:29:00
  • Last modified 05.05.2025 14:14:33

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to th...

  • EPSS 1.11%
  • Published 06.03.2018 20:29:00
  • Last modified 05.05.2025 14:12:56

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string w...