Fedoraproject

Fedora

5335 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to ...

  • EPSS 0.08%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in Xen 4.9 through 4.14.x. On Arm, a guest is allowed to control whether memory accesses are bypassing the cache. This means that Xen needs to ensure that all writes (such as the ones during scrubbing) have reached the memory ...

  • EPSS 0.13%
  • Veröffentlicht 17.02.2021 02:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 4.18 through 5.10.16, as used by Xen. The backend allocation (aka be-alloc) mode of the drm_xen_front drivers was not meant to be a supported configuration, but this wasn't stated accordingly in its support...

  • EPSS 0.12%
  • Veröffentlicht 17.02.2021 02:15:12
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of g...

  • EPSS 0.11%
  • Veröffentlicht 17.02.2021 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:04

An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error enco...

  • EPSS 5.21%
  • Veröffentlicht 15.02.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:37

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

Exploit
  • EPSS 1.37%
  • Veröffentlicht 15.02.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:37

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corrupti...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 15.02.2021 13:15:12
  • Zuletzt bearbeitet 17.12.2025 22:15:55

The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector c...

  • EPSS 0.06%
  • Veröffentlicht 11.02.2021 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:33:58

A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image.

  • EPSS 0.12%
  • Veröffentlicht 11.02.2021 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:33:58

A bitmap double free in main.c in autotrace 0.31.1 allows attackers to cause an unspecified impact via a malformed bitmap image. This may occur after the use-after-free in CVE-2017-9182.