Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 18.02.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:47

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentiall...

  • EPSS 0.79%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 02:47:52

A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.

  • EPSS 0.2%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:33

A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

  • EPSS 0.28%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:34

A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and a...

  • EPSS 0.04%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:22

A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.

  • EPSS 0.02%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:22

A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 16.02.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:20

A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 16.02.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:20

A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulne...

  • EPSS 0.65%
  • Veröffentlicht 16.02.2022 19:15:08
  • Zuletzt bearbeitet 28.03.2025 15:15:41

A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.

  • EPSS 0.02%
  • Veröffentlicht 16.02.2022 17:15:11
  • Zuletzt bearbeitet 21.11.2024 06:21:49

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privile...