Redhat

Enterprise Linux

1730 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 15.01.2024 11:15:08
  • Zuletzt bearbeitet 21.11.2024 08:34:11

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an exte...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2024 10:15:26
  • Zuletzt bearbeitet 21.11.2024 08:44:49

A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 12.01.2024 23:15:10
  • Zuletzt bearbeitet 10.12.2025 17:15:50

Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.

  • EPSS 0.07%
  • Veröffentlicht 12.01.2024 19:15:11
  • Zuletzt bearbeitet 02.05.2025 15:10:54

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading t...

  • EPSS 0.01%
  • Veröffentlicht 12.01.2024 00:15:45
  • Zuletzt bearbeitet 21.11.2024 08:46:36

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is calle...

  • EPSS 0.3%
  • Veröffentlicht 10.01.2024 13:15:48
  • Zuletzt bearbeitet 18.03.2026 04:16:51

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of ...

  • EPSS 0.16%
  • Veröffentlicht 08.01.2024 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:56

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

  • EPSS 0.01%
  • Veröffentlicht 03.01.2024 17:15:12
  • Zuletzt bearbeitet 21.11.2024 08:46:05

A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory reg...

  • EPSS 0.05%
  • Veröffentlicht 03.01.2024 17:15:11
  • Zuletzt bearbeitet 04.11.2025 19:16:23

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through th...

  • EPSS 0.02%
  • Veröffentlicht 02.01.2024 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:45:28

A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount...