Redhat

Enterprise Linux

1709 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Published 23.11.2013 18:55:04
  • Last modified 11.04.2025 00:51:21

The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on...

Exploit
  • EPSS 6.01%
  • Published 23.11.2013 18:55:04
  • Last modified 11.04.2025 00:51:21

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based...

  • EPSS 0.14%
  • Published 23.11.2013 18:55:04
  • Last modified 11.04.2025 00:51:21

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.

Exploit
  • EPSS 0.14%
  • Published 23.11.2013 18:55:04
  • Last modified 11.04.2025 00:51:21

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overfl...

Exploit
  • EPSS 0.08%
  • Published 23.11.2013 18:55:04
  • Last modified 11.04.2025 00:51:21

OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary files via a symlink attack on (1) ibdiagnet.db, (2) ibdiagnet.fdbs, (3) ibdiagnet_ibis.log, (4) ibdiagnet.log, (5) ibdiagnet.lst, (6) ibdiagnet.mcfdbs, (7) ibdiagnet.pkey, (8) ibdiag...

Exploit
  • EPSS 0.67%
  • Published 23.11.2013 11:55:04
  • Last modified 11.04.2025 00:51:21

Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection b...

Exploit
  • EPSS 0.03%
  • Published 23.11.2013 11:55:04
  • Last modified 11.04.2025 00:51:21

util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.

  • EPSS 0.03%
  • Published 23.11.2013 11:55:04
  • Last modified 11.04.2025 00:51:21

Race condition in Luci 0.26.0 creates /var/lib/luci/etc/luci.ini with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as "authentication secrets."

  • EPSS 0.05%
  • Published 23.11.2013 11:55:04
  • Last modified 11.04.2025 00:51:21

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent ...

  • EPSS 0.42%
  • Published 23.11.2013 11:55:04
  • Last modified 11.04.2025 00:51:21

389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.