Opensuse

Leap

1897 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 38.85%
  • Veröffentlicht 07.08.2020 16:15:11
  • Zuletzt bearbeitet 01.05.2025 15:40:19

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLev...

  • EPSS 0.05%
  • Veröffentlicht 07.08.2020 10:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:14

A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUS...

  • EPSS 0.08%
  • Veröffentlicht 06.08.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:07:15

Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.

  • EPSS 0.05%
  • Veröffentlicht 05.08.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:03

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running...

  • EPSS 1.26%
  • Veröffentlicht 05.08.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:07:56

scm/define-stencil-commands.scm in LilyPond through 2.20.0, and 2.21.x through 2.21.4, when -dsafe is used, lacks restrictions on embedded-ps and embedded-svg, as demonstrated by including dangerous PostScript code.

  • EPSS 0.83%
  • Veröffentlicht 03.08.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:47

In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.

  • EPSS 0.05%
  • Veröffentlicht 31.07.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:58

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font val...

  • EPSS 0.03%
  • Veröffentlicht 31.07.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:58

There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subseque...

  • EPSS 1.85%
  • Veröffentlicht 30.07.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:53

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c...

  • EPSS 0.26%
  • Veröffentlicht 30.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 04:55:54

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, a...