Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Fedora
(Fedoraproject)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-09-22 | CVE-2022-3256 | Use After Free in GitHub repository vim/vim prior to 9.0.0530. | Debian_linux, Fedora, Vim | 7.8 | ||
2022-09-22 | CVE-2022-1941 | A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend... | Debian_linux, Fedora, Protobuf\-Cpp, Protobuf\-Python | 7.5 | ||
2022-09-23 | CVE-2022-35951 | Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist. | Fedora, Redis | 9.8 | ||
2022-09-23 | CVE-2022-3278 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552. | Fedora, Vim | 5.5 | ||
2022-09-25 | CVE-2022-3296 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577. | Fedora, Vim | 7.8 | ||
2022-09-25 | CVE-2022-3297 | Use After Free in GitHub repository vim/vim prior to 9.0.0579. | Fedora, Vim | 7.8 | ||
2022-09-26 | CVE-2022-21797 | The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement. | Debian_linux, Fedora, Joblib | 9.8 | ||
2022-09-26 | CVE-2022-3201 | Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High) | Debian_linux, Fedora, Chrome | 5.4 | ||
2022-09-27 | CVE-2022-3324 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598. | Debian_linux, Fedora, Vim | 7.8 | ||
2022-09-28 | CVE-2022-39261 | Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such... | Debian_linux, Drupal, Fedora, Twig | 7.5 |