Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.88%
  • Veröffentlicht 01.01.2022 06:15:07
  • Zuletzt bearbeitet 22.05.2025 15:15:54

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

Exploit
  • EPSS 0.54%
  • Veröffentlicht 01.01.2022 05:15:08
  • Zuletzt bearbeitet 21.11.2024 06:26:48

Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 25.12.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:37:03

vim is vulnerable to Out-of-bounds Read

  • EPSS 0.29%
  • Veröffentlicht 23.12.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:00

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as...

Exploit
  • EPSS 0.58%
  • Veröffentlicht 23.12.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:00

A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat f...

  • EPSS 0.1%
  • Veröffentlicht 23.12.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 06:36:44

A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses o...

  • EPSS 1.39%
  • Veröffentlicht 23.12.2021 06:15:06
  • Zuletzt bearbeitet 21.11.2024 06:32:15

load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. N...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 22.12.2021 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:28

A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 15.12.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:54

stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists b...

  • EPSS 72.2%
  • Veröffentlicht 14.12.2021 12:15:12
  • Zuletzt bearbeitet 21.11.2024 06:36:54

JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppen...