Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 27.69%
  • Veröffentlicht 05.11.2010 17:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbi...

Exploit
  • EPSS 1.99%
  • Veröffentlicht 24.09.2010 19:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in page/Geolocation.cpp in WebCore in WebKit before r59859, as used in Google Chrome before 5.0.375.70, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web ...

  • EPSS 1.78%
  • Veröffentlicht 24.09.2010 19:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit before r59950, as used in Google Chrome before 5.0.375.70, allows remote attackers to obtain sensitive information, cause a denial of service (memory...

Exploit
  • EPSS 0.58%
  • Veröffentlicht 02.07.2010 12:43:53
  • Zuletzt bearbeitet 11.04.2025 00:51:21

LibTIFF in Red Hat Enterprise Linux (RHEL) 3 on x86_64 platforms, as used in tiff2rgba, attempts to process image data even when the required compression functionality is not configured, which allows remote attackers to cause a denial of service via ...

  • EPSS 2.04%
  • Veröffentlicht 12.05.2010 11:46:31
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows guest OS users to cause a denial of service (32-bit guest OS crash) via vectors that trigger an unspecified instruction emulatio...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 16.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute ...

  • EPSS 0.05%
  • Veröffentlicht 16.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

A certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 4 on the ia64 platform allows local users to use ptrace on an arbitrary process, and consequently gain privileges, via vectors related to a missing ptrace_check_attach ca...

  • EPSS 5.29%
  • Veröffentlicht 05.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denia...

  • EPSS 0.03%
  • Veröffentlicht 27.01.2010 17:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport...

  • EPSS 12.31%
  • Veröffentlicht 09.01.2010 18:30:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) requ...