Redhat

Enterprise Linux

1715 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.02%
  • Veröffentlicht 21.03.2024 13:00:08
  • Zuletzt bearbeitet 13.05.2025 09:15:19

A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. Th...

  • EPSS 0.06%
  • Veröffentlicht 18.03.2024 13:15:08
  • Zuletzt bearbeitet 09.04.2025 15:36:43

A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. This issue can occur when detaching a host interface while at the same time collecting the list of interfaces via virConnectListAllInterfaces API. Th...

  • EPSS 0.11%
  • Veröffentlicht 18.03.2024 13:15:07
  • Zuletzt bearbeitet 09.04.2025 15:36:37

A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.

  • EPSS 0.05%
  • Veröffentlicht 18.03.2024 13:15:06
  • Zuletzt bearbeitet 03.11.2025 21:16:03

A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely wa...

  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 15:15:07
  • Zuletzt bearbeitet 01.04.2025 15:34:51

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group pri...

  • EPSS 3.12%
  • Veröffentlicht 22.02.2024 17:15:08
  • Zuletzt bearbeitet 04.11.2025 19:16:22

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...

  • EPSS 0.07%
  • Veröffentlicht 15.02.2024 05:15:10
  • Zuletzt bearbeitet 30.01.2025 22:15:09

A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuratio...

Medienbericht
  • EPSS 44.43%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 04.11.2025 19:16:14

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...

Medienbericht Exploit
  • EPSS 13.77%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 23.12.2025 20:20:08

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka...

  • EPSS 0.08%
  • Veröffentlicht 12.02.2024 23:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:40

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the comput...