Redhat

Enterprise Linux

1730 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 25.10.2023 20:15:18
  • Zuletzt bearbeitet 21.11.2024 08:42:02

A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen ...

Exploit
  • EPSS 0%
  • Veröffentlicht 25.10.2023 18:17:41
  • Zuletzt bearbeitet 04.11.2025 20:17:11

An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also cor...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 25.10.2023 18:17:41
  • Zuletzt bearbeitet 04.11.2025 20:17:11

An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive ...

  • EPSS 0.02%
  • Veröffentlicht 23.10.2023 22:15:09
  • Zuletzt bearbeitet 25.02.2026 19:29:20

The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acce...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.10.2023 02:15:11
  • Zuletzt bearbeitet 21.11.2024 08:42:00

A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability.

  • EPSS 0.04%
  • Veröffentlicht 12.10.2023 12:15:10
  • Zuletzt bearbeitet 04.11.2025 20:17:07

A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.

Warnung Medienbericht Exploit
  • EPSS 94.39%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.08%
  • Veröffentlicht 10.10.2023 13:15:22
  • Zuletzt bearbeitet 04.11.2025 20:17:07

A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.

  • EPSS 0.04%
  • Veröffentlicht 10.10.2023 13:15:22
  • Zuletzt bearbeitet 04.11.2025 20:17:07

A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.

  • EPSS 0.02%
  • Veröffentlicht 10.10.2023 13:15:22
  • Zuletzt bearbeitet 04.11.2025 20:17:07

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.