Fedoraproject

Fedora

5353 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.9%
  • Veröffentlicht 25.09.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:30

Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions ...

Exploit
  • EPSS 0.75%
  • Veröffentlicht 17.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:56

The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call.

Exploit
  • EPSS 0.65%
  • Veröffentlicht 17.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:56

The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call.

Exploit
  • EPSS 0.72%
  • Veröffentlicht 16.09.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:50

The html package (aka x/net/html) before 2018-07-13 in Go mishandles "in frameset" insertion mode, leading to a "panic: runtime error" for html.Parse of <template><object>, <template><applet>, or <template><marquee>. This is related to HTMLTreeBuilde...

  • EPSS 3.14%
  • Veröffentlicht 24.08.2018 19:29:01
  • Zuletzt bearbeitet 21.11.2024 03:49:22

An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation f...

  • EPSS 2.46%
  • Veröffentlicht 24.08.2018 19:29:01
  • Zuletzt bearbeitet 21.11.2024 03:49:23

An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.

  • EPSS 0.19%
  • Veröffentlicht 22.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data...

  • EPSS 1.09%
  • Veröffentlicht 22.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing dat...

  • EPSS 0.01%
  • Veröffentlicht 22.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain ...

  • EPSS 0.45%
  • Veröffentlicht 14.08.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:52

libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.