Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.07%
  • Veröffentlicht 14.12.2013 18:08:45
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.

  • EPSS 2.02%
  • Veröffentlicht 12.12.2013 18:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code ...

  • EPSS 3.44%
  • Veröffentlicht 12.12.2013 18:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window Syste...

  • EPSS 0.12%
  • Veröffentlicht 12.12.2013 18:55:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

  • EPSS 0.33%
  • Veröffentlicht 06.12.2013 17:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 23.11.2013 18:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on...

Exploit
  • EPSS 6.01%
  • Veröffentlicht 23.11.2013 18:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based...

  • EPSS 0.14%
  • Veröffentlicht 23.11.2013 18:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 23.11.2013 18:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overfl...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 23.11.2013 18:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary files via a symlink attack on (1) ibdiagnet.db, (2) ibdiagnet.fdbs, (3) ibdiagnet_ibis.log, (4) ibdiagnet.log, (5) ibdiagnet.lst, (6) ibdiagnet.mcfdbs, (7) ibdiagnet.pkey, (8) ibdiag...