Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 15.01.2024 10:15:26
  • Zuletzt bearbeitet 21.11.2024 08:44:49

A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.01.2024 23:15:10
  • Zuletzt bearbeitet 04.06.2025 16:15:30

Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.

  • EPSS 0.07%
  • Veröffentlicht 12.01.2024 19:15:11
  • Zuletzt bearbeitet 02.05.2025 15:10:54

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading t...

  • EPSS 0.01%
  • Veröffentlicht 12.01.2024 00:15:45
  • Zuletzt bearbeitet 21.11.2024 08:46:36

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is calle...

  • EPSS 0.37%
  • Veröffentlicht 10.01.2024 13:15:48
  • Zuletzt bearbeitet 21.11.2024 08:41:47

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of ...

  • EPSS 0.12%
  • Veröffentlicht 08.01.2024 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:56

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

  • EPSS 0.01%
  • Veröffentlicht 03.01.2024 17:15:12
  • Zuletzt bearbeitet 21.11.2024 08:46:05

A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory reg...

  • EPSS 0.07%
  • Veröffentlicht 03.01.2024 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:42:57

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through th...

  • EPSS 0.02%
  • Veröffentlicht 02.01.2024 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:45:28

A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount...

  • EPSS 0.06%
  • Veröffentlicht 02.01.2024 18:15:08
  • Zuletzt bearbeitet 21.11.2024 08:46:02

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN o...