Redhat

Enterprise Linux Server

1890 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.17%
  • Published 17.02.2019 02:29:00
  • Last modified 21.11.2024 04:49:47

An issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Servic...

Exploit
  • EPSS 0.18%
  • Published 17.02.2019 02:29:00
  • Last modified 21.11.2024 04:49:48

An issue was discovered in AdvanceCOMP through 2.1. An invalid memory address occurs in the function adv_png_unfilter_8 in lib/png.c. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segme...

Exploit
  • EPSS 7.22%
  • Published 15.02.2019 15:29:00
  • Last modified 21.11.2024 04:47:20

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

  • EPSS 0.07%
  • Published 12.02.2019 23:29:00
  • Last modified 21.11.2024 04:49:39

Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.

Exploit
  • EPSS 53.41%
  • Published 11.02.2019 19:29:00
  • Last modified 21.11.2024 04:45:24

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types ...

Exploit
  • EPSS 0.83%
  • Published 11.02.2019 15:29:00
  • Last modified 21.11.2024 03:45:24

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly ...

  • EPSS 0.76%
  • Published 11.02.2019 15:29:00
  • Last modified 21.11.2024 03:45:25

In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.

Exploit
  • EPSS 0.37%
  • Published 09.02.2019 16:29:00
  • Last modified 21.11.2024 04:48:29

In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).

Exploit
  • EPSS 0.14%
  • Published 09.02.2019 16:29:00
  • Last modified 21.11.2024 04:48:29

In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does n...

  • EPSS 30.24%
  • Published 05.02.2019 21:29:00
  • Last modified 21.11.2024 03:56:03

A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affec...