Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 11.02.2022 18:15:11
  • Zuletzt bearbeitet 21.11.2024 06:38:55

Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, t...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 09.02.2022 23:15:16
  • Zuletzt bearbeitet 21.11.2024 06:38:51

A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code ex...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 09.02.2022 23:15:16
  • Zuletzt bearbeitet 21.11.2024 06:38:51

A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code ex...

  • EPSS 0.75%
  • Veröffentlicht 04.02.2022 23:15:12
  • Zuletzt bearbeitet 21.11.2024 06:37:00

A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading...

  • EPSS 0.07%
  • Veröffentlicht 04.02.2022 23:15:12
  • Zuletzt bearbeitet 21.11.2024 06:38:45

A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kerne...

Warnung Exploit
  • EPSS 87.04%
  • Veröffentlicht 28.01.2022 20:15:12
  • Zuletzt bearbeitet 03.04.2025 18:53:12

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pk...

  • EPSS 0.13%
  • Veröffentlicht 25.01.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:36:59

A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the gu...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 20.01.2022 18:15:07
  • Zuletzt bearbeitet 21.11.2024 06:32:10

AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.

  • EPSS 0.39%
  • Veröffentlicht 13.01.2022 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:45:13

Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory wi...

  • EPSS 0.18%
  • Veröffentlicht 12.01.2022 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:57

Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to...