Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 02.01.2024 10:15:08
  • Zuletzt bearbeitet 06.05.2025 09:15:16

A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. Th...

  • EPSS 0.02%
  • Veröffentlicht 27.12.2023 16:15:13
  • Zuletzt bearbeitet 21.11.2024 08:35:35

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker w...

  • EPSS 0.01%
  • Veröffentlicht 24.12.2023 07:15:07
  • Zuletzt bearbeitet 22.09.2025 17:16:06

OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable ...

Exploit
  • EPSS 0.84%
  • Veröffentlicht 24.12.2023 06:15:07
  • Zuletzt bearbeitet 21.11.2024 08:38:44

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...

Exploit
  • EPSS 23.08%
  • Veröffentlicht 24.12.2023 05:15:08
  • Zuletzt bearbeitet 21.11.2024 08:38:44

Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a publishe...

  • EPSS 0.29%
  • Veröffentlicht 21.12.2023 20:15:08
  • Zuletzt bearbeitet 21.11.2024 08:44:04

A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free...

  • EPSS 0.36%
  • Veröffentlicht 19.12.2023 00:15:08
  • Zuletzt bearbeitet 15.02.2025 01:15:09

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, ...

Medienbericht Exploit
  • EPSS 64.06%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 0.11%
  • Veröffentlicht 18.12.2023 14:15:08
  • Zuletzt bearbeitet 27.03.2025 14:42:34

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

  • EPSS 0.45%
  • Veröffentlicht 12.12.2023 22:15:22
  • Zuletzt bearbeitet 21.11.2024 08:44:24

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias ...