Show filters
135 Total Results
Displaying 11-20 of 135
Sort by:
Attacker Value
Unknown

CVE-2016-5416

Disclosure Date: June 08, 2017 (last updated November 26, 2024)
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to read the default Access Control Instructions.
0
Attacker Value
Unknown

CVE-2016-5410

Disclosure Date: April 19, 2017 (last updated November 08, 2023)
firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
0
Attacker Value
Unknown

CVE-2016-6489

Disclosure Date: April 14, 2017 (last updated November 26, 2024)
The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
Attacker Value
Unknown

CVE-2016-4455

Disclosure Date: April 14, 2017 (last updated November 26, 2024)
The Subscription Manager package (aka subscription-manager) before 1.17.7-1 for Candlepin uses weak permissions (755) for subscription-manager cache directories, which allows local users to obtain sensitive information by reading files in the directories.
Attacker Value
Unknown

CVE-2016-4445

Disclosure Date: April 11, 2017 (last updated November 26, 2024)
The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
0
Attacker Value
Unknown

CVE-2016-4444

Disclosure Date: April 11, 2017 (last updated November 26, 2024)
The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
0
Attacker Value
Unknown

CVE-2016-4446

Disclosure Date: April 11, 2017 (last updated November 26, 2024)
The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function.
0
Attacker Value
Unknown

CVE-2016-4989

Disclosure Date: April 11, 2017 (last updated November 26, 2024)
setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.
0
Attacker Value
Unknown

CVE-2016-7545

Disclosure Date: January 19, 2017 (last updated November 08, 2023)
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
0
Attacker Value
Unknown

CVE-2016-7091

Disclosure Date: December 22, 2016 (last updated November 25, 2024)
sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
0