Redhat

Enterprise Linux

1709 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 15.01.2024 10:15:26
  • Last modified 21.11.2024 08:44:49

A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.

Exploit
  • EPSS 0.09%
  • Published 12.01.2024 23:15:10
  • Last modified 04.06.2025 16:15:30

Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.

  • EPSS 0.07%
  • Published 12.01.2024 19:15:11
  • Last modified 02.05.2025 15:10:54

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading t...

  • EPSS 0.01%
  • Published 12.01.2024 00:15:45
  • Last modified 21.11.2024 08:46:36

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is calle...

  • EPSS 0.37%
  • Published 10.01.2024 13:15:48
  • Last modified 21.11.2024 08:41:47

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of ...

  • EPSS 0.12%
  • Published 08.01.2024 19:15:08
  • Last modified 21.11.2024 06:21:56

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

  • EPSS 0.01%
  • Published 03.01.2024 17:15:12
  • Last modified 21.11.2024 08:46:05

A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory reg...

  • EPSS 0.07%
  • Published 03.01.2024 17:15:11
  • Last modified 21.11.2024 08:42:57

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through th...

  • EPSS 0.02%
  • Published 02.01.2024 19:15:11
  • Last modified 21.11.2024 08:45:28

A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount...

  • EPSS 0.06%
  • Published 02.01.2024 18:15:08
  • Last modified 21.11.2024 08:46:02

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN o...