Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 25.08.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:13:04

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake age...

  • EPSS 0.03%
  • Veröffentlicht 23.08.2023 13:15:07
  • Zuletzt bearbeitet 21.11.2024 08:34:17

A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.

  • EPSS 0.03%
  • Veröffentlicht 23.08.2023 11:15:07
  • Zuletzt bearbeitet 21.11.2024 08:18:19

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the reg...

  • EPSS 0.01%
  • Veröffentlicht 21.08.2023 19:15:09
  • Zuletzt bearbeitet 21.11.2024 08:35:12

A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of...

  • EPSS 0.02%
  • Veröffentlicht 16.08.2023 19:15:10
  • Zuletzt bearbeitet 03.06.2025 03:15:25

A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleani...

  • EPSS 0.61%
  • Veröffentlicht 11.08.2023 13:15:09
  • Zuletzt bearbeitet 21.11.2024 08:15:22

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, tru...

  • EPSS 0.44%
  • Veröffentlicht 11.08.2023 13:15:09
  • Zuletzt bearbeitet 06.12.2024 11:15:06

A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a ...

Exploit
  • EPSS 0.73%
  • Veröffentlicht 11.08.2023 03:15:14
  • Zuletzt bearbeitet 21.11.2024 07:22:21

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 15:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:46

A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts b...

  • EPSS 0.15%
  • Veröffentlicht 07.08.2023 14:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:28

A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.