Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 25.09.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 07:35:01

A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 25.09.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:30

A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 22.09.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:23:15

aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag ver...

  • EPSS 17.33%
  • Veröffentlicht 22.09.2023 14:15:47
  • Zuletzt bearbeitet 17.03.2025 16:43:52

A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 22.09.2023 06:15:09
  • Zuletzt bearbeitet 21.11.2024 08:23:42

A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 21.09.2023 23:15:12
  • Zuletzt bearbeitet 23.04.2025 17:16:44

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in...

Warnung
  • EPSS 12.7%
  • Veröffentlicht 21.09.2023 19:15:11
  • Zuletzt bearbeitet 29.11.2024 14:43:20

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS bef...

Exploit
  • EPSS 3.22%
  • Veröffentlicht 21.09.2023 06:15:13
  • Zuletzt bearbeitet 21.11.2024 08:24:35

The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempte...

  • EPSS 0.19%
  • Veröffentlicht 20.09.2023 13:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:41

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This iss...

  • EPSS 0.29%
  • Veröffentlicht 20.09.2023 13:15:11
  • Zuletzt bearbeitet 21.11.2024 08:17:03

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-p...