Redhat

Enterprise Linux

1709 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 07.09.2021 14:15:11
  • Last modified 21.11.2024 06:08:38

In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out...

  • EPSS 0.12%
  • Published 31.08.2021 17:15:08
  • Last modified 21.11.2024 06:22:02

A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but a...

Exploit
  • EPSS 0.54%
  • Published 27.08.2021 15:15:09
  • Last modified 21.11.2024 06:23:40

squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination dire...

  • EPSS 0.08%
  • Published 25.08.2021 19:15:14
  • Last modified 21.11.2024 06:21:57

There's a flaw in OpenEXR's rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to appli...

Exploit
  • EPSS 0.02%
  • Published 13.08.2021 14:15:07
  • Last modified 21.11.2024 06:21:52

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_bl...

  • EPSS 0.15%
  • Published 13.08.2021 14:15:07
  • Last modified 21.11.2024 06:22:02

A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.

  • EPSS 0.17%
  • Published 12.08.2021 15:15:07
  • Last modified 21.11.2024 05:46:21

Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.

  • EPSS 0.07%
  • Published 07.08.2021 04:15:06
  • Last modified 05.05.2025 14:12:40

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is...

  • EPSS 0.02%
  • Published 05.08.2021 21:15:13
  • Last modified 21.11.2024 06:22:05

A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.

  • EPSS 0.04%
  • Published 05.08.2021 21:15:12
  • Last modified 21.11.2024 06:21:53

A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.