Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 06.11.2023 17:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:26

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security ...

  • EPSS 0.32%
  • Veröffentlicht 06.11.2023 17:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:26

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical acce...

  • EPSS 0.02%
  • Veröffentlicht 06.11.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 08:41:02

A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.

  • EPSS 0.58%
  • Veröffentlicht 06.11.2023 07:15:09
  • Zuletzt bearbeitet 21.11.2024 08:22:55

A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpc...

  • EPSS 0.01%
  • Veröffentlicht 03.11.2023 14:15:08
  • Zuletzt bearbeitet 03.11.2025 20:16:06

A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL...

Exploit
  • EPSS 1.94%
  • Veröffentlicht 03.11.2023 13:15:08
  • Zuletzt bearbeitet 21.11.2024 08:18:24

A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services ...

  • EPSS 0.02%
  • Veröffentlicht 03.11.2023 09:15:13
  • Zuletzt bearbeitet 21.11.2024 07:39:16

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate the...

  • EPSS 44.74%
  • Veröffentlicht 03.11.2023 08:15:08
  • Zuletzt bearbeitet 21.11.2024 08:29:25

Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.

  • EPSS 8.23%
  • Veröffentlicht 03.11.2023 08:15:08
  • Zuletzt bearbeitet 21.11.2024 08:29:25

Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.

  • EPSS 0.48%
  • Veröffentlicht 03.11.2023 08:15:08
  • Zuletzt bearbeitet 21.11.2024 08:34:22

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows openi...