Red Hat Enterprise Linux Compute Node EUS 7.4

CPE Details

Red Hat Enterprise Linux Compute Node EUS 7.4
7.4
2022-02-08
15h30 +00:00
2022-02-11
13h56 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

enterprise_linux_compute_node_eus

Version

7.4

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2017-15129 2018-01-09 18h00 +00:00 A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
4.7
Moyen
CVE-2015-3214 2015-08-31 08h00 +00:00 The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
6.9
CVE-2015-5165 2015-08-12 12h00 +00:00 The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
9.3