Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 24.05.2012 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.

  • EPSS 0.75%
  • Veröffentlicht 24.05.2012 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting thes...

  • EPSS 0.12%
  • Veröffentlicht 17.05.2012 11:00:37
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 17.05.2012 11:00:32
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.

  • EPSS 0.06%
  • Veröffentlicht 17.05.2012 11:00:31
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The m_stop function in fs/proc/task_mmu.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.

Exploit
  • EPSS 2.13%
  • Veröffentlicht 11.04.2012 10:39:25
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 11.04.2012 10:39:25
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to ep...

Exploit
  • EPSS 2.69%
  • Veröffentlicht 11.04.2012 10:39:25
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.

Exploit
  • EPSS 8.64%
  • Veröffentlicht 11.04.2012 10:39:25
  • Zuletzt bearbeitet 11.04.2025 00:51:21

wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in an AIX iptrace file.

  • EPSS 7.72%
  • Veröffentlicht 22.03.2012 16:55:01
  • Zuletzt bearbeitet 09.06.2025 16:15:22

Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly exe...