Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.29%
  • Veröffentlicht 14.10.2022 18:15:14
  • Zuletzt bearbeitet 03.11.2025 21:15:52

A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.09.2022 14:15:08
  • Zuletzt bearbeitet 05.06.2025 19:15:23

An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups ar...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 13.09.2022 14:15:08
  • Zuletzt bearbeitet 21.11.2024 07:02:02

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups a...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.09.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:01:54

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

  • EPSS 0.05%
  • Veröffentlicht 09.09.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:01:59

A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.

  • EPSS 0.31%
  • Veröffentlicht 09.09.2022 14:15:08
  • Zuletzt bearbeitet 03.11.2025 22:15:46

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes()...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 06.09.2022 18:15:11
  • Zuletzt bearbeitet 21.11.2024 06:51:58

A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 06.09.2022 18:15:11
  • Zuletzt bearbeitet 21.11.2024 06:51:58

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 06.09.2022 18:15:11
  • Zuletzt bearbeitet 21.11.2024 06:51:58

A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing...

Exploit
  • EPSS 1.26%
  • Veröffentlicht 01.09.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 07:01:25

An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expect...