Fedoraproject

Fedora

5326 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 13.12.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:29

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the t...

  • EPSS 0.11%
  • Veröffentlicht 13.12.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:48

hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.

  • EPSS 0.09%
  • Veröffentlicht 13.12.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:00

v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.

  • EPSS 0.17%
  • Veröffentlicht 12.12.2018 13:29:02
  • Zuletzt bearbeitet 21.11.2024 03:53:29

A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, thi...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 12.12.2018 10:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:52

There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.

  • EPSS 0.47%
  • Veröffentlicht 11.12.2018 17:29:00
  • Zuletzt bearbeitet 27.12.2024 16:15:22

urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to uni...

Exploit
  • EPSS 0.71%
  • Veröffentlicht 10.12.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:43

An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by test...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 10.12.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:44

An issue has been found in Mini-XML (aka mxml) 2.12. It is a use-after-free in mxmlWalkNext in mxml-search.c, as demonstrated by mxmldoc.

  • EPSS 11.36%
  • Veröffentlicht 07.12.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:40

Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

Exploit
  • EPSS 1.46%
  • Veröffentlicht 04.12.2018 16:29:00
  • Zuletzt bearbeitet 03.12.2025 19:15:47

In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.