Fedoraproject

Fedora

5319 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 19.05.2020 19:15:09
  • Last modified 21.11.2024 04:55:56

A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read.

  • EPSS 0.09%
  • Published 19.05.2020 17:15:10
  • Last modified 21.11.2024 04:56:32

PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritat...

  • EPSS 0.75%
  • Published 19.05.2020 15:15:11
  • Last modified 21.11.2024 05:11:11

A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This fla...

  • EPSS 0.09%
  • Published 19.05.2020 14:15:11
  • Last modified 21.11.2024 04:59:22

An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.

  • EPSS 13.51%
  • Published 19.05.2020 14:15:11
  • Last modified 21.11.2024 05:00:00

Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.

  • EPSS 12.63%
  • Published 19.05.2020 14:15:11
  • Last modified 21.11.2024 05:00:01

Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.

  • EPSS 92.63%
  • Published 19.05.2020 14:15:11
  • Last modified 21.11.2024 05:39:07

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local se...

  • EPSS 0.1%
  • Published 15.05.2020 18:15:13
  • Last modified 21.11.2024 05:00:29

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

Exploit
  • EPSS 2.38%
  • Published 15.05.2020 16:15:11
  • Last modified 21.11.2024 03:41:59

Use-after-free in libtransmission/variant.c in Transmission before 3.00 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted torrent file.

Exploit
  • EPSS 0.59%
  • Published 15.05.2020 14:15:11
  • Last modified 21.11.2024 05:31:47

Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.