Red Hat Enterprise Linux For Power Little Endian EUS 7.4

CPE Details

Red Hat Enterprise Linux For Power Little Endian EUS 7.4
7.4
2022-02-10
14h28 +00:00
2022-02-11
13h56 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

enterprise_linux_for_power_little_endian_eus

Version

7.4

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-6454 2019-03-17 15h38 +00:00 An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
5.5
Moyen
CVE-2017-15129 2018-01-09 18h00 +00:00 A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
4.7
Moyen