Redhat

Enterprise Linux

1715 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 21.06.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:41:12

A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and c...

  • EPSS 0.08%
  • Veröffentlicht 16.06.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:06:35

A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other...

  • EPSS 0.11%
  • Veröffentlicht 16.06.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:06:36

A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other...

  • EPSS 0.1%
  • Veröffentlicht 16.06.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:06:36

In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, th...

  • EPSS 0.13%
  • Veröffentlicht 09.06.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:41:55

A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate th...

Exploit
  • EPSS 0.59%
  • Veröffentlicht 07.06.2022 18:15:11
  • Zuletzt bearbeitet 21.11.2024 06:41:17

A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O...

  • EPSS 0.68%
  • Veröffentlicht 02.06.2022 14:15:34
  • Zuletzt bearbeitet 13.12.2024 18:47:19

An access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that would yield incorrect results, but as that has progressed, can be determined that it actually is an access control bypass. This may allow any remote unau...

  • EPSS 0.02%
  • Veröffentlicht 02.06.2022 14:15:33
  • Zuletzt bearbeitet 21.11.2024 06:41:28

With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 02.06.2022 14:15:32
  • Zuletzt bearbeitet 21.11.2024 06:40:46

An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc functi...

  • EPSS 0.14%
  • Veröffentlicht 02.06.2022 14:15:32
  • Zuletzt bearbeitet 21.11.2024 06:41:10

Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to exe...