Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.02%
  • Veröffentlicht 21.03.2024 13:00:08
  • Zuletzt bearbeitet 13.05.2025 09:15:19

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. Th...

  • EPSS 0.05%
  • Veröffentlicht 18.03.2024 13:15:08
  • Zuletzt bearbeitet 09.04.2025 15:36:43

A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. This issue can occur when detaching a host interface while at the same time collecting the list of interfaces via virConnectListAllInterfaces API. Th...

  • EPSS 0.11%
  • Veröffentlicht 18.03.2024 13:15:07
  • Zuletzt bearbeitet 09.04.2025 15:36:37

A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.

  • EPSS 0.05%
  • Veröffentlicht 18.03.2024 13:15:06
  • Zuletzt bearbeitet 03.11.2025 21:16:03

A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely wa...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 15:15:07
  • Zuletzt bearbeitet 01.04.2025 15:34:51

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group pri...

  • EPSS 3.38%
  • Veröffentlicht 22.02.2024 17:15:08
  • Zuletzt bearbeitet 04.11.2025 19:16:22

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...

  • EPSS 0.07%
  • Veröffentlicht 15.02.2024 05:15:10
  • Zuletzt bearbeitet 30.01.2025 22:15:09

A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuratio...

Medienbericht
  • EPSS 36.76%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 04.11.2025 19:16:14

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...

  • EPSS 0.08%
  • Veröffentlicht 12.02.2024 23:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:40

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the comput...

  • EPSS 0.03%
  • Veröffentlicht 12.02.2024 14:15:08
  • Zuletzt bearbeitet 21.11.2024 08:44:20

A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computati...