Redhat

Enterprise Linux

1715 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 08.12.2023 18:15:07
  • Zuletzt bearbeitet 25.06.2025 20:52:54

A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.

Exploit
  • EPSS 0.01%
  • Veröffentlicht 08.12.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 08:44:11

An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.

Exploit
  • EPSS 0.01%
  • Veröffentlicht 08.12.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 08:44:11

An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.

  • EPSS 0.1%
  • Veröffentlicht 27.11.2023 12:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:40

A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.

  • EPSS 0.01%
  • Veröffentlicht 16.11.2023 18:15:07
  • Zuletzt bearbeitet 21.11.2024 08:43:17

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local use...

  • EPSS 0.25%
  • Veröffentlicht 16.11.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 08:43:10

An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed an...

  • EPSS 1.77%
  • Veröffentlicht 09.11.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 08:41:59

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

  • EPSS 0.14%
  • Veröffentlicht 09.11.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 08:41:59

The course upload preview contained an XSS risk for users uploading unsafe data.

  • EPSS 0.18%
  • Veröffentlicht 09.11.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 08:41:58

Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

  • EPSS 0.01%
  • Veröffentlicht 09.11.2023 20:15:08
  • Zuletzt bearbeitet 21.11.2024 08:14:53

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allow...