Redhat

Enterprise Linux

1709 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.

  • EPSS 0.06%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.03%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Exploit
  • EPSS 9.8%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

  • EPSS 5.38%
  • Veröffentlicht 04.11.2014 16:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing...

Exploit
  • EPSS 10.78%
  • Veröffentlicht 03.11.2014 16:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.

  • EPSS 94.02%
  • Veröffentlicht 15.10.2014 00:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

Warnung Exploit
  • EPSS 90.11%
  • Veröffentlicht 25.09.2014 01:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted enviro...

Warnung Exploit
  • EPSS 94.22%
  • Veröffentlicht 24.09.2014 18:48:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceComman...

  • EPSS 0.31%
  • Veröffentlicht 21.08.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.