Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.06%
  • Veröffentlicht 18.09.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:38:35

Node.js < 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.

  • EPSS 0.2%
  • Veröffentlicht 18.09.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:38:35

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

  • EPSS 0.63%
  • Veröffentlicht 18.09.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:29

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multit...

  • EPSS 0.12%
  • Veröffentlicht 17.09.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:39:41

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

  • EPSS 0.28%
  • Veröffentlicht 16.09.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:08

A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in fil...

  • EPSS 0.04%
  • Veröffentlicht 16.09.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

  • EPSS 0.55%
  • Veröffentlicht 16.09.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.

  • EPSS 0.1%
  • Veröffentlicht 16.09.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:09

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.

  • EPSS 0.42%
  • Veröffentlicht 15.09.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:41

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 11.09.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:05

An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest thre...