Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.73%
  • Veröffentlicht 14.06.2014 11:18:54
  • Zuletzt bearbeitet 12.04.2025 10:46:40

A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.

  • EPSS 0.05%
  • Veröffentlicht 11.06.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.

Exploit
  • EPSS 92.69%
  • Veröffentlicht 05.06.2014 21:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL...

  • EPSS 91.4%
  • Veröffentlicht 05.06.2014 21:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereferen...

  • EPSS 83.02%
  • Veröffentlicht 05.06.2014 21:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS...

  • EPSS 0.09%
  • Veröffentlicht 05.06.2014 17:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a lar...

  • EPSS 0.04%
  • Veröffentlicht 05.06.2014 17:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering...

Warnung Exploit
  • EPSS 69.02%
  • Veröffentlicht 07.05.2014 10:55:04
  • Zuletzt bearbeitet 22.10.2025 01:15:53

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or ...

  • EPSS 0.55%
  • Veröffentlicht 18.04.2014 14:55:25
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 01.04.2014 06:35:52
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command....