Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht Exploit
  • EPSS 12.11%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 23.12.2025 20:20:08

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 13.02.2024 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:59:46

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_...

  • EPSS 0.21%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 14.03.2025 17:15:40

The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` insta...

  • EPSS 0.14%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 21.11.2024 08:41:55

A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, and - the resolver receives a PTR query for an RFC 1918 address that would normally result in an a...

  • EPSS 0.14%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 29.03.2025 00:15:16

A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18...

  • EPSS 0.08%
  • Veröffentlicht 12.02.2024 23:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:40

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the comput...

  • EPSS 0.03%
  • Veröffentlicht 12.02.2024 14:15:08
  • Zuletzt bearbeitet 21.11.2024 08:44:20

A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computati...

  • EPSS 0.02%
  • Veröffentlicht 12.02.2024 13:15:09
  • Zuletzt bearbeitet 18.02.2025 11:15:11

A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.

  • EPSS 0.02%
  • Veröffentlicht 12.02.2024 03:15:32
  • Zuletzt bearbeitet 04.11.2025 19:16:23

dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.

  • EPSS 0.02%
  • Veröffentlicht 11.02.2024 15:15:07
  • Zuletzt bearbeitet 21.11.2024 08:49:54

A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many fram...