Fedoraproject

Fedora

5326 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.96%
  • Veröffentlicht 04.02.2019 21:29:01
  • Zuletzt bearbeitet 21.11.2024 04:17:41

libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, rea...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 03.02.2019 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:47:58

In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a c...

  • EPSS 9.74%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:57

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes t...

Exploit
  • EPSS 60.04%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 18.12.2025 15:15:48

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned...

Exploit
  • EPSS 0.86%
  • Veröffentlicht 31.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:47:55

In NetKit through 0.17, rcp.c in the rcp client allows remote rsh servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side. This is s...

  • EPSS 4.39%
  • Veröffentlicht 30.01.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:03

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_htt...

Exploit
  • EPSS 59.73%
  • Veröffentlicht 16.01.2019 05:29:01
  • Zuletzt bearbeitet 21.07.2025 23:15:25

An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this...

  • EPSS 0.62%
  • Veröffentlicht 15.01.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:01

Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd servic...

  • EPSS 0.15%
  • Veröffentlicht 15.01.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:35

A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem ac...

  • EPSS 0.76%
  • Veröffentlicht 14.01.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:32

etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Nam...