Fedoraproject

Fedora

5319 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 01.05.2024 13:15:52
  • Zuletzt bearbeitet 13.03.2025 20:15:23

Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 21.11.2024 09:03:39

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS When disabling aRFS under the `priv->state_lock`, any scheduled aRFS works are canceled using the `cancel_work_sync` function, whic...

  • EPSS 0.02%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 21.11.2024 09:03:39

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header ...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 21.11.2024 09:03:40

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: validate pppoe header Ensure there is sufficient room to access the protocol field of the PPPoe header. Validate it once before the flowtable lookup, then use...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 21.11.2024 09:03:40

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot ...

  • EPSS 0.02%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 23.05.2025 20:49:21

In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: skip conntrack input hook for promisc packets For historical reasons, when bridge device is in promisc mode, packets that are directed to the taps follow b...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 21.11.2024 09:03:40

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() nft_unregister_obj() can concurrent with __nft_obj_type_get(), and there is not any protection when iterate ov...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 21.11.2024 09:03:40

In the Linux kernel, the following vulnerability has been resolved: r8169: fix LED-related deadlock on module removal Binding devm_led_classdev_register() to the netdev is problematic because on module removal we get a RTNL-related deadlock. Fix th...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:19
  • Zuletzt bearbeitet 27.12.2024 13:15:18

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: restore set elements when delete set fails From abort path, nft_mapelem_activate() needs to restore refcounters to the original state. Currently, it uses the ...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:19
  • Zuletzt bearbeitet 21.11.2024 09:03:39

In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev vhost_worker will call tun call backs to receive packets. If too many illegal packets arrives, tun_do_read will kee...