Redhat

Enterprise Linux Server

1890 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 27.69%
  • Published 05.11.2010 17:00:01
  • Last modified 11.04.2025 00:51:21

ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbi...

  • EPSS 0.13%
  • Published 22.06.2010 17:30:01
  • Last modified 11.04.2025 00:51:21

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

  • EPSS 5.29%
  • Published 05.03.2010 19:30:00
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denia...

Exploit
  • EPSS 1.81%
  • Published 27.01.2010 17:30:00
  • Last modified 11.04.2025 00:51:21

A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and...

  • EPSS 0.07%
  • Published 20.11.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.

Exploit
  • EPSS 0.04%
  • Published 16.11.2009 19:30:01
  • Last modified 09.04.2025 00:30:58

The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.

Exploit
  • EPSS 3.44%
  • Published 04.11.2009 15:30:00
  • Last modified 09.04.2025 00:30:58

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathna...

Exploit
  • EPSS 0.86%
  • Published 23.10.2009 18:30:00
  • Last modified 09.04.2025 00:30:58

Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data tr...

  • EPSS 0.05%
  • Published 20.10.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 p...

  • EPSS 0.08%
  • Published 19.10.2009 20:00:00
  • Last modified 09.04.2025 00:30:58

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users ...