Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 28.17%
  • Veröffentlicht 10.07.2019 19:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:15

In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow a...

  • EPSS 0.55%
  • Veröffentlicht 10.07.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:24:29

A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair o...

  • EPSS 0.13%
  • Veröffentlicht 10.07.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:24:29

A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for P...

  • EPSS 0.05%
  • Veröffentlicht 05.07.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:24:41

libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 04.07.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:37

In Xpdf 4.01.01, there is a heap-based buffer over-read in the function JBIG2Stream::readTextRegionSeg() located at JBIG2Stream.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker t...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 04.07.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:37

In Xpdf 4.01.01, a heap-based buffer overflow could be triggered in DCTStream::decodeImage() in Stream.cc when writing to frameBuf memory. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows an attacke...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 04.07.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:37

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in SampledFunction::transform in Function.cc when using a large index for samples. It can, for example, be triggered by sending a crafted PDF document to the pdftotext tool. It allows ...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 04.07.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:37

In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in strncpy from FoFiType1::parse in fofi/FoFiType1.cc because it does not ensure the source string has a valid length before making a fixed-length copy. It can, for example, be trigger...

  • EPSS 0.05%
  • Veröffentlicht 04.07.2019 12:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:29

deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to ...

  • EPSS 3.98%
  • Veröffentlicht 03.07.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:47:42

A buffer overflow in DOSBox 0.74-2 allows attackers to execute arbitrary code.