Fedoraproject

Fedora

5331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier....

  • EPSS 0.11%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been ...

  • EPSS 0.11%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profi...

  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some...

  • EPSS 0.08%
  • Veröffentlicht 13.04.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:15

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup th...

  • EPSS 1.24%
  • Veröffentlicht 13.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:45

Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.61%
  • Veröffentlicht 13.04.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:35:45

Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.

  • EPSS 1.49%
  • Veröffentlicht 13.04.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:35:43

Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Exploit
  • EPSS 0.92%
  • Veröffentlicht 13.04.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:35:43

Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.