Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 15.12.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use...

  • EPSS 0.09%
  • Veröffentlicht 15.12.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:33

A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system ava...

  • EPSS 0.11%
  • Veröffentlicht 11.12.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:53

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This fl...

  • EPSS 12.25%
  • Veröffentlicht 11.12.2020 05:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:49

A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and be...

  • EPSS 0.65%
  • Veröffentlicht 08.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:29

A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial ...

  • EPSS 0.1%
  • Veröffentlicht 06.12.2020 00:15:11
  • Zuletzt bearbeitet 21.11.2024 05:24:14

sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen wh...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to a...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero....

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lea...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:48

A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely le...