Vulnerabilities > Redhat > Enterprise Linux Desktop > 4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-08-27 | CVE-2008-3844 | Improper Input Validation vulnerability in Openbsd Openssh Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. | 9.3 |
2008-05-23 | CVE-2008-1767 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Redhat products Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps. | 7.5 |
2008-05-08 | CVE-2008-1615 | Resource Management Errors vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls. | 4.9 |
2008-05-08 | CVE-2007-6282 | Configuration vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV. | 7.1 |
2008-02-05 | CVE-2007-4130 | Improper Input Validation vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation. | 7.2 |