Fedoraproject

Fedora

5335 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.52%
  • Veröffentlicht 09.12.2022 18:15:20
  • Zuletzt bearbeitet 14.04.2025 18:15:25

The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.

  • EPSS 0.53%
  • Veröffentlicht 08.12.2022 20:15:10
  • Zuletzt bearbeitet 21.11.2024 07:23:43

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending v...

  • EPSS 0.14%
  • Veröffentlicht 08.12.2022 16:15:14
  • Zuletzt bearbeitet 22.04.2025 21:15:44

A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.

  • EPSS 0.04%
  • Veröffentlicht 08.12.2022 16:15:14
  • Zuletzt bearbeitet 22.04.2025 21:15:44

A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.

Exploit
  • EPSS 66.39%
  • Veröffentlicht 06.12.2022 05:15:11
  • Zuletzt bearbeitet 03.11.2025 22:15:57

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possibl...

  • EPSS 0.3%
  • Veröffentlicht 04.12.2022 03:15:09
  • Zuletzt bearbeitet 24.04.2025 16:15:23

AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.

  • EPSS 0.12%
  • Veröffentlicht 30.11.2022 17:15:10
  • Zuletzt bearbeitet 21.11.2024 07:30:12

Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerab...

  • EPSS 0.02%
  • Veröffentlicht 29.11.2022 18:15:10
  • Zuletzt bearbeitet 14.04.2025 18:15:24

An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into a...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 29.11.2022 18:15:10
  • Zuletzt bearbeitet 14.04.2025 18:15:25

An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer alloc...

  • EPSS 0.02%
  • Veröffentlicht 28.11.2022 22:15:11
  • Zuletzt bearbeitet 14.04.2025 18:15:24

A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a ...