Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Fedora
(Fedoraproject)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-11 | CVE-2020-11863 | libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 1 of 2). | Fedora, Libemf, Leap | 5.5 | ||
2020-05-11 | CVE-2020-11864 | libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 2 of 2). | Fedora, Libemf, Leap | 5.5 | ||
2020-05-11 | CVE-2020-11865 | libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows out-of-bounds memory access. | Fedora, Libemf, Leap | 7.8 | ||
2020-05-11 | CVE-2020-11866 | libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows a use-after-free. | Fedora, Libemf, Leap | 7.8 | ||
2020-05-11 | CVE-2018-1285 | Apache log4net versions before 2.0.10 do not disable XML external entities when parsing log4net configuration files. This allows for XXE-based attacks in applications that accept attacker-controlled log4net configuration files. | Log4net, Fedora, Manageability_software_development_kit, Snapcenter, Application_testing_suite, Hospitality_opera_5, Hospitality_simphony | 9.8 | ||
2020-05-15 | CVE-2018-10756 | Use-after-free in libtransmission/variant.c in Transmission before 3.00 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted torrent file. | Debian_linux, Fedora, Transmission | 7.8 | ||
2020-05-19 | CVE-2020-12244 | An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. | Debian_linux, Fedora, Backports_sle, Leap, Recursor | 7.5 | ||
2020-05-19 | CVE-2020-10995 | PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect.... | Debian_linux, Fedora, Backports_sle, Leap, Recursor | 7.5 | ||
2020-05-19 | CVE-2020-10722 | A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption. | Ubuntu_linux, Data_plane_development_kit, Fedora, Leap, Communications_session_border_controller, Enterprise_communications_broker | 6.7 | ||
2020-05-19 | CVE-2020-10723 | A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption. | Ubuntu_linux, Data_plane_development_kit, Fedora, Leap, Communications_session_border_controller, Enterprise_communications_broker | 6.7 |