Redhat

Enterprise Linux Desktop

1928 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.04%
  • Published 12.05.2010 11:46:31
  • Last modified 11.04.2025 00:51:21

The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows guest OS users to cause a denial of service (32-bit guest OS crash) via vectors that trigger an unspecified instruction emulatio...

  • EPSS 5.29%
  • Published 05.03.2010 19:30:00
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denia...

Exploit
  • EPSS 1.81%
  • Published 27.01.2010 17:30:00
  • Last modified 11.04.2025 00:51:21

A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and...

  • EPSS 0.07%
  • Published 20.11.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.

Exploit
  • EPSS 0.04%
  • Published 16.11.2009 19:30:01
  • Last modified 09.04.2025 00:30:58

The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.

Exploit
  • EPSS 3.44%
  • Published 04.11.2009 15:30:00
  • Last modified 09.04.2025 00:30:58

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathna...

  • EPSS 0.05%
  • Published 20.10.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 p...

  • EPSS 0.08%
  • Published 19.10.2009 20:00:00
  • Last modified 09.04.2025 00:30:58

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users ...

Exploit
  • EPSS 23.09%
  • Published 27.08.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vecto...

Exploit
  • EPSS 0.09%
  • Published 18.08.2009 21:00:00
  • Last modified 09.04.2025 00:30:58

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone ...