Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.22%
  • Veröffentlicht 20.07.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:09:45

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.07.2021 19:15:09
  • Zuletzt bearbeitet 09.06.2025 16:15:32

basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.

Exploit
  • EPSS 0.81%
  • Veröffentlicht 20.07.2021 15:15:11
  • Zuletzt bearbeitet 21.11.2024 06:21:09

A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.

  • EPSS 0.21%
  • Veröffentlicht 20.07.2021 07:15:08
  • Zuletzt bearbeitet 21.11.2024 06:14:25

Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb).

  • EPSS 0.05%
  • Veröffentlicht 20.07.2021 07:15:07
  • Zuletzt bearbeitet 21.11.2024 04:39:50

objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).

  • EPSS 0.31%
  • Veröffentlicht 20.07.2021 07:15:07
  • Zuletzt bearbeitet 21.11.2024 05:29:29

libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.

  • EPSS 0.19%
  • Veröffentlicht 20.07.2021 07:15:07
  • Zuletzt bearbeitet 03.11.2025 22:15:49

libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).

  • EPSS 0.07%
  • Veröffentlicht 19.07.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:07:41

containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 16.07.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:07:39

fail2ban is a daemon to ban hosts that cause multiple authentication errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0 through 0.11.2, there is a vulnerability that leads to possible remote code execution in the mailing action ma...

  • EPSS 1.48%
  • Veröffentlicht 15.07.2021 14:15:19
  • Zuletzt bearbeitet 21.11.2024 06:10:40

The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.