Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 21.11%
  • Veröffentlicht 23.05.2008 15:32:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that trigg...

Exploit
  • EPSS 17.15%
  • Veröffentlicht 22.05.2008 13:09:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a ...

  • EPSS 0.05%
  • Veröffentlicht 08.05.2008 00:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.

Exploit
  • EPSS 2.45%
  • Veröffentlicht 08.05.2008 00:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.

  • EPSS 0.06%
  • Veröffentlicht 08.05.2008 00:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.

  • EPSS 0.04%
  • Veröffentlicht 04.04.2008 00:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Replace function in the capp-lspp-config script in the (1) lspp-eal4-config-ibm and (2) capp-lspp-eal4-config-hp packages before 0.65-2 in Red Hat Enterprise Linux (RHEL) 5 uses lstat instead of stat to determine the /etc/pam.d/system-auth file p...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 06.03.2008 21:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshare...

  • EPSS 0.06%
  • Veröffentlicht 29.02.2008 19:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a m...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 05.02.2008 00:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_m...

  • EPSS 0.11%
  • Veröffentlicht 20.12.2007 22:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 and 5, does not specify the nodev mount option for the -hosts map, which allows local users to access "important devices" by opera...