Fedoraproject Fedora vulnerabilities
5,277 known vulnerabilities affecting fedoraproject/fedora.
Total CVEs
5,277
CISA KEV
84
actively exploited
Public exploits
126
Exploited in wild
101
Severity breakdown
CRITICAL514HIGH2325MEDIUM2265LOW173
Vulnerabilities
Page 6 of 264
CVE-2024-27008HIGHCVSS 7.8v38v39+1 more2024-05-01
CVE-2024-27008 [HIGH] CWE-125 CVE-2024-27008: In the Linux kernel, the following vulnerability has been resolved:
drm: nv04: Fix out of bounds ac
In the Linux kernel, the following vulnerability has been resolved:
drm: nv04: Fix out of bounds access
When Output Resource (dcb->or) value is assigned in
fabricate_dcb_output(), there may be out of bounds access to
dac_users array in case dcb->or is zero because ffs(dcb->or) is
used as index there.
The 'or' argument of fabricate_dcb_output() must
nvd
CVE-2024-27018HIGHCVSS 7.8v38v39+1 more2024-05-01
CVE-2024-27018 [HIGH] CVE-2024-27018: In the Linux kernel, the following vulnerability has been resolved:
netfilter: br_netfilter: skip c
In the Linux kernel, the following vulnerability has been resolved:
netfilter: br_netfilter: skip conntrack input hook for promisc packets
For historical reasons, when bridge device is in promisc mode, packets
that are directed to the taps follow bridge input hook path. This patch
adds a workaround to reset conntrack for these packets.
Jianbo Liu reports w
nvd
CVE-2024-4368HIGHCVSS 8.8v38v39+1 more2024-05-01
CVE-2024-4368 [HIGH] CWE-416 CVE-2024-4368: Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potenti
Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
nvd
CVE-2024-4331HIGHCVSS 8.8v38v39+1 more2024-05-01
CVE-2024-4331 [HIGH] CWE-416 CVE-2024-4331: Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attac
Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
nvd
CVE-2024-27021HIGHCVSS 7.8v38v39+1 more2024-05-01
CVE-2024-27021 [HIGH] CWE-667 CVE-2024-27021: In the Linux kernel, the following vulnerability has been resolved:
r8169: fix LED-related deadlock
In the Linux kernel, the following vulnerability has been resolved:
r8169: fix LED-related deadlock on module removal
Binding devm_led_classdev_register() to the netdev is problematic
because on module removal we get a RTNL-related deadlock. Fix this
by avoiding the device-managed LED functions.
Note: We can safely call led_classdev_unregister() fo
nvd
CVE-2024-27001MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27001 [MEDIUM] CVE-2024-27001: In the Linux kernel, the following vulnerability has been resolved:
comedi: vmk80xx: fix incomplete
In the Linux kernel, the following vulnerability has been resolved:
comedi: vmk80xx: fix incomplete endpoint checking
While vmk80xx does have endpoint checking implemented, some things
can fall through the cracks. Depending on the hardware model,
URBs can have either bulk or interrupt type, and current version
of vmk80xx_find_usb_endpoints() function does
nvd
CVE-2024-27017MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27017 [MEDIUM] CVE-2024-27017: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: walk
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: walk over current view on netlink dump
The generation mask can be updated while netlink dump is in progress.
The pipapo set backend walk iterator cannot rely on it to infer what
view of the datastructure is to be used. Add notation to specify if user
wants to re
nvd
CVE-2024-26994MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-26994 [MEDIUM] CVE-2024-26994: In the Linux kernel, the following vulnerability has been resolved:
speakup: Avoid crash on very lo
In the Linux kernel, the following vulnerability has been resolved:
speakup: Avoid crash on very long word
In case a console is set up really large and contains a really long word
(> 256 characters), we have to stop before the length of the word buffer.
nvd
CVE-2024-27014MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27014 [MEDIUM] CWE-667 CVE-2024-27014: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Prevent deadlock whi
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Prevent deadlock while disabling aRFS
When disabling aRFS under the `priv->state_lock`, any scheduled
aRFS works are canceled using the `cancel_work_sync` function,
which waits for the work to end if it has already started.
However, while waiting for the work handler, t
nvd
CVE-2024-26987MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-26987 [MEDIUM] CWE-667 CVE-2024-26987: In the Linux kernel, the following vulnerability has been resolved:
mm/memory-failure: fix deadlock
In the Linux kernel, the following vulnerability has been resolved:
mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled
When I did hard offline test with hugetlb pages, below deadlock occurs:
WARNING: possible circular locking dependency detected
6.8.0-11409-gf6cef5f8c37f #1 Not tainted
bash/46904 is trying to acquire lock:
f
nvd
CVE-2024-4059MEDIUMCVSS 6.5v402024-05-01
CVE-2024-4059 [MEDIUM] CWE-125 CVE-2024-4059: Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to le
Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to leak cross-site data via a crafted HTML page. (Chromium security severity: High)
nvd
CVE-2024-27013MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27013 [MEDIUM] CWE-770 CVE-2024-27013: In the Linux kernel, the following vulnerability has been resolved:
tun: limit printing rate when i
In the Linux kernel, the following vulnerability has been resolved:
tun: limit printing rate when illegal packet received by tun dev
vhost_worker will call tun call backs to receive packets. If too many
illegal packets arrives, tun_do_read will keep dumping packet contents.
When console is enabled, it will costs much more cpu time to dump
packet a
nvd
CVE-2024-27019MEDIUMCVSS 4.7v38v39+1 more2024-05-01
CVE-2024-27019 [MEDIUM] CWE-362 CVE-2024-27019: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix poten
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
nft_unregister_obj() can concurrent with __nft_obj_type_get(),
and there is not any protection when iterate over nf_tables_objects
list in __nft_obj_type_get(). Therefore, there is potential data-race
of nf_tabl
nvd
CVE-2024-27012MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27012 [MEDIUM] CWE-401 CVE-2024-27012: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: restore s
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: restore set elements when delete set fails
From abort path, nft_mapelem_activate() needs to restore refcounters to
the original state. Currently, it uses the set->ops->walk() to iterate
over these set elements. The existing set iterator skips inactive
element
nvd
CVE-2024-27016MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27016 [MEDIUM] CVE-2024-27016: In the Linux kernel, the following vulnerability has been resolved:
netfilter: flowtable: validate
In the Linux kernel, the following vulnerability has been resolved:
netfilter: flowtable: validate pppoe header
Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field.
nvd
CVE-2024-27004MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27004 [MEDIUM] CWE-667 CVE-2024-27004: In the Linux kernel, the following vulnerability has been resolved:
clk: Get runtime PM before walk
In the Linux kernel, the following vulnerability has been resolved:
clk: Get runtime PM before walking tree during disable_unused
Doug reported [1] the following hung task:
INFO: task swapper/0:1 blocked for more than 122 seconds.
Not tainted 5.15.149-21875-gf795ebc40eb8 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
nvd
CVE-2024-27015MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-27015 [MEDIUM] CVE-2024-27015: In the Linux kernel, the following vulnerability has been resolved:
netfilter: flowtable: incorrect
In the Linux kernel, the following vulnerability has been resolved:
netfilter: flowtable: incorrect pppoe tuple
pppoe traffic reaching ingress path does not match the flowtable entry
because the pppoe header is expected to be at the network header offset.
This bug causes a mismatch in the flow table lookup, so pppoe packets
enter the classical forwarding
nvd
CVE-2024-4060MEDIUMCVSS 6.5v402024-05-01
CVE-2024-4060 [MEDIUM] CWE-416 CVE-2024-4060: Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentia
Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
nvd
CVE-2024-26986MEDIUMCVSS 5.5v38v39+1 more2024-05-01
CVE-2024-26986 [MEDIUM] CWE-401 CVE-2024-26986: In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix memory leak in
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix memory leak in create_process failure
Fix memory leak due to a leaked mmget reference on an error handling
code path that is triggered when attempting to create KFD processes
while a GPU reset is in progress.
nvd
CVE-2024-1874CRITICALCVSS 9.4v39v402024-04-29
CVE-2024-1874 [CRITICAL] CWE-116 CVE-2024-1874: In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open()
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
nvd