Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Veröffentlicht 16.09.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.

  • EPSS 0.16%
  • Veröffentlicht 16.09.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:09

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.

  • EPSS 0.31%
  • Veröffentlicht 15.09.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:41

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 ...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 11.09.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:05

An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest thre...

  • EPSS 20.52%
  • Veröffentlicht 11.09.2020 17:15:18
  • Zuletzt bearbeitet 21.11.2024 05:09:37

<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with th...

  • EPSS 0.3%
  • Veröffentlicht 11.09.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:59

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with...

  • EPSS 1.15%
  • Veröffentlicht 11.09.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:59

In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpe...

Exploit
  • EPSS 0.59%
  • Veröffentlicht 09.09.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:17:41

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 09.09.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:17:39

In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_connt...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 09.09.2020 12:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:03

It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this ...