Fedoraproject

Fedora

5326 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.15%
  • Veröffentlicht 01.05.2024 13:15:52
  • Zuletzt bearbeitet 04.11.2025 18:16:42

Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0.95%
  • Veröffentlicht 01.05.2024 13:15:52
  • Zuletzt bearbeitet 20.12.2024 17:22:46

Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Exploit
  • EPSS 0.33%
  • Veröffentlicht 01.05.2024 13:15:52
  • Zuletzt bearbeitet 13.03.2025 20:15:23

Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:11

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS When disabling aRFS under the `priv->state_lock`, any scheduled aRFS works are canceled using the `cancel_work_sync` function, whic...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:11

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header ...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:11

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: validate pppoe header Ensure there is sufficient room to access the protocol field of the PPPoe header. Validate it once before the flowtable lookup, then use...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:11

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation mask can be updated while netlink dump is in progress. The pipapo set backend walk iterator cannot ...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:11

In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: skip conntrack input hook for promisc packets For historical reasons, when bridge device is in promisc mode, packets that are directed to the taps follow b...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:11

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() nft_unregister_obj() can concurrent with __nft_obj_type_get(), and there is not any protection when iterate ov...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2024 06:15:20
  • Zuletzt bearbeitet 04.11.2025 18:16:12

In the Linux kernel, the following vulnerability has been resolved: r8169: fix LED-related deadlock on module removal Binding devm_led_classdev_register() to the netdev is problematic because on module removal we get a RTNL-related deadlock. Fix th...