Redhat

Enterprise Linux Server

1891 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht Exploit
  • EPSS 0.58%
  • Veröffentlicht 12.06.2025 12:49:16
  • Zuletzt bearbeitet 29.11.2025 01:16:03

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Exploit
  • EPSS 0.72%
  • Veröffentlicht 03.04.2025 03:15:18
  • Zuletzt bearbeitet 18.11.2025 09:15:50

A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP serv...

Exploit
  • EPSS 13.04%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 20.11.2025 21:15:59

A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of un...

Warnung Exploit
  • EPSS 86.25%
  • Veröffentlicht 31.01.2024 13:15:10
  • Zuletzt bearbeitet 27.10.2025 17:06:37

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the n...

  • EPSS 0.02%
  • Veröffentlicht 18.01.2024 16:15:08
  • Zuletzt bearbeitet 29.08.2025 13:42:30

A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another r...

  • EPSS 0.02%
  • Veröffentlicht 18.01.2024 16:15:08
  • Zuletzt bearbeitet 29.08.2025 13:42:30

A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX contex...

  • EPSS 3.16%
  • Veröffentlicht 18.01.2024 05:15:08
  • Zuletzt bearbeitet 29.08.2025 13:42:30

A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for th...

  • EPSS 0.31%
  • Veröffentlicht 10.01.2024 13:15:48
  • Zuletzt bearbeitet 21.11.2024 08:41:47

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of ...

  • EPSS 1.24%
  • Veröffentlicht 10.12.2023 18:15:07
  • Zuletzt bearbeitet 04.11.2025 20:17:13

A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remo...

  • EPSS 45.33%
  • Veröffentlicht 03.11.2023 08:15:08
  • Zuletzt bearbeitet 21.11.2024 08:29:25

Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.