Redhat

Enterprise Linux

1730 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht Exploit
  • EPSS 3.19%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 22.12.2025 13:15:47

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using...

  • EPSS 2.89%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 03.11.2025 22:16:39

A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, w...

  • EPSS 0.08%
  • Veröffentlicht 12.11.2024 03:15:03
  • Zuletzt bearbeitet 14.11.2024 13:38:04

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

  • EPSS 0.11%
  • Veröffentlicht 12.11.2024 03:15:03
  • Zuletzt bearbeitet 14.11.2024 13:33:35

In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

  • EPSS 0.06%
  • Veröffentlicht 12.11.2024 02:15:18
  • Zuletzt bearbeitet 16.07.2025 12:15:22

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.

  • EPSS 0.02%
  • Veröffentlicht 29.10.2024 01:15:04
  • Zuletzt bearbeitet 03.11.2025 23:16:47

In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() retu...

  • EPSS 1.33%
  • Veröffentlicht 15.10.2024 16:15:06
  • Zuletzt bearbeitet 19.03.2026 18:16:13

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image us...

  • EPSS 0.14%
  • Veröffentlicht 09.10.2024 15:15:17
  • Zuletzt bearbeitet 25.08.2025 02:11:05

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/w...

  • EPSS 0.9%
  • Veröffentlicht 01.10.2024 19:15:09
  • Zuletzt bearbeitet 11.12.2024 04:15:06

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and tri...

  • EPSS 0.05%
  • Veröffentlicht 19.09.2024 11:15:10
  • Zuletzt bearbeitet 21.11.2024 09:53:05

A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the h...