Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung
  • EPSS 0.23%
  • Veröffentlicht 16.01.2024 22:15:37
  • Zuletzt bearbeitet 20.12.2024 19:01:11

Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0.41%
  • Veröffentlicht 16.01.2024 15:15:08
  • Zuletzt bearbeitet 21.11.2024 08:43:46

The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the ex...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 16.01.2024 14:15:48
  • Zuletzt bearbeitet 21.11.2024 08:46:06

A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a...

Exploit
  • EPSS 1.3%
  • Veröffentlicht 16.01.2024 14:15:48
  • Zuletzt bearbeitet 21.11.2024 08:46:53

A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, r...

Exploit
  • EPSS 1.03%
  • Veröffentlicht 16.01.2024 12:15:45
  • Zuletzt bearbeitet 21.11.2024 08:46:51

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing s...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2024 11:15:08
  • Zuletzt bearbeitet 21.11.2024 08:34:11

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an exte...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.01.2024 23:15:10
  • Zuletzt bearbeitet 04.06.2025 16:15:30

Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.

  • EPSS 0.01%
  • Veröffentlicht 12.01.2024 00:15:45
  • Zuletzt bearbeitet 21.11.2024 08:46:36

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is calle...

  • EPSS 0.07%
  • Veröffentlicht 10.01.2024 22:15:50
  • Zuletzt bearbeitet 03.06.2025 15:15:54

Insufficient data validation in Extensions in Google Chrome prior to 120.0.6099.216 allowed an attacker in a privileged network position to install a malicious extension via a crafted HTML page. (Chromium security severity: High)

  • EPSS 5.32%
  • Veröffentlicht 10.01.2024 16:15:46
  • Zuletzt bearbeitet 21.11.2024 08:20:28

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7....