Redhat

Enterprise Linux

1731 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 04.03.2022 18:15:08
  • Zuletzt bearbeitet 03.11.2025 20:15:50

A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.

  • EPSS 0.2%
  • Veröffentlicht 04.03.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:23

When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certif...

  • EPSS 0.12%
  • Veröffentlicht 03.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:57

An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When ru...

  • EPSS 0.17%
  • Veröffentlicht 03.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:00

A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

  • EPSS 5.74%
  • Veröffentlicht 03.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:38:46

A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the...

  • EPSS 0.08%
  • Veröffentlicht 02.03.2022 23:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:14

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the ...

  • EPSS 0.15%
  • Veröffentlicht 02.03.2022 23:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:23

A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP ad...

  • EPSS 0.05%
  • Veröffentlicht 02.03.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:00

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The h...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 02.03.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:01

A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat ...

  • EPSS 0.44%
  • Veröffentlicht 02.03.2022 23:15:08
  • Zuletzt bearbeitet 10.02.2025 13:10:12

An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients co...