Fedora Linux has long been a favorite operating system (OS) for developers looking for an innovative, free environment. Originally developed and now sponsored by Red Hat, the open-source Fedora Project has a little something for everyone with its Workstation, Server, Internet of Things (IoT), Virtual Machine (VM), and container-optimized CoreOS options.
As a trusted open-source OS, attackers will seek to exploit any vulnerabilities to poison the supply stream. Knowing these 39 Fedora Linux 38 vulnerabilities can help you secure your applications more effectively.
What is Fedora Linux 38 (F38)?
Fedora Linux 38 (F38) is the most recent release of the popular open-source OS. With F38’s April 2023 release, the Fedora Project brought developers:
- New Spins that showcase different desktop environments
- A mobile device image for Pinephone, Pinephone Pro, Pinetab, and Librem devices
- Desktop experience enhancements, including a new lock screen, “background apps” on the quick menu, and accessibility setting improvements
- Sysadmin improvements with the lighter-weight default package manager microdnf
39 F38 Vulnerabilities You Should Know
Although only released in April 2023, 158 vulnerabilities in F38 had been identified by September. However, since not all of those vulnerabilities pose the same risk, this list is based on the following factors:
- Listed in the Cybersecurity and Infrastructure Security Agency’s (CISA’s) Known Exploited Vulnerability (KEV) list
- Exploit Prediction Scoring System (EPSS) rating above 1%, indicating the likelihood of exploitation in the next 30 days
- Maximum base Common Vulnerability Scoring System (CVSS) score of 8.8 or above
The 39 F38 vulnerabilities you should be worried about are:
- CVE-2023-2136 (KEV): allowed a remote attacker who compromised the renderer process to perform a sandbox escape potentially via a crafted HTML page
- CVE-2023-3079 (KEV): allowed remote attacker to potentially exploit heap corruption via a crafted HTML page
- CVE-2023-34966 (EPSS 7.93%): allows an attacker to trigger an infinite loop by issuing a malformed RPC request that results in a denial of service (DoS) condition
- CVE-2023-34967 (EPSS 7.55%): allows an attacker to trigger a process crash because multiple client connections share an RPC worker process, so affecting one shared RPC mdssvc worker process affects other clients this worker serves
- CVE-2023-38408 (EPSS 3.65%): allows attackers to execute code remotely if an agent is forwarded to an attacker-controlled system, related to an incomplete fix for CVE-2016-10009
- CVE-2023-24805: allows attackers with network access to a hosted print server to inject system commands that the running server can execute.
- CVE-2022-24834: allows attackers with specially crafted Lua scripts executing in Redis to trigger a heap overflow that results in heap corruption and potential remote code execution.
- CVE-2023-34152: causes a remote code execution vulnerability in OpenBlob with –enable-pipes configured
- CVE-2023-36328: allows attackers to execute arbitrary code and cause a denial of service
- CVE-2023-2134: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-2133: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-2137: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-36824: potentially triggers a heap overflow in Redis that could result in reading random heap memory, heap corruption, and potentially remote code execution
- CVE-2023-2724: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-2461: allows remote attackers who convince users to engage in specific UI interactions potential to exploit heap corruption
- CVE-2023-2721: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-2722: potentially allows remote attackers to exploit heap corruption via a crafted HTML page
- CVE-2023-2723: potentially allows remote attackers who compromise the renderer process to exploit heap corruption via a crafted HTML page
- CVE-2023-2724: potentially allows remote attackers to exploit heap corruption via a crafted HTML page
- CVE-2023-2725: potentially allows attacks that convince a user to install a malicious extension to exploit heap corruption via a crafted HTML page
- CVE-2023-2726: potentially allows attackers that convince a user to install a malicious web app to bypass the install dialog via a crafted HTML page
- CVE-2023-3214: potentially allows remote attackers to exploit heap corruption via a crafted HTML page
- CVE-2023-3215: potentially allows remote attackers to exploit heap corruption via a crafted HTML page
- CVE-2023-3216: potentially allows remote attackers to exploit heap corruption via a crafted HTML page
- CVE-2023-3217: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4073: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4349: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4351: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4352: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4353: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4354: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4355: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4356: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4357: potentially allows remote attackers to bypass file access restrictions via a crafted HTML page
- CVE-2023-4358: potentially allows a remote attacker to exploit heap corruption via a crafted HTML page
- CVE-2023-4366: potentially allows attacks that convince a user to install a malicious extension to exploit heap corruption via a crafted HTML page
- CVE-2023-25358: allows attackers to execute code remotely
- CVE-2023-32004: causes a traversal path to bypass when verifying file permissions in an experimental permission model
- CVE-2023-32006: allows for policy mechanism bypass and requiring modules outside of the policy for a given module in an experimental policy mechanism feature
Qwiet.ai: Identifying Real Threats through Reachability
As attackers increasingly target Linux vulnerabilities, you need visibility into the ones that can become genuine threats. Remediating 158 new vulnerabilities over four months is overwhelming, especially as researchers find more CVEs and you build more code. Even keeping up with the 39 high-value vulnerabilities can be challenging, especially as that number can change from one day to the next.
Qwiet AI’s preZero platform enables you to rapidly scan your code to identify vulnerabilities in source code and business logic. To help you prioritize your activities, you can focus on those vulnerabilities that attackers can actively exploit within the context of your application. Further, our Blacklight is the first threat intelligence feed designed to help developers prioritize fixes by focusing on the exploits, threat actors, ransomware, and botnets actively exploiting vulnerabilities in the wild.
Take our preZero platform for a spin for free to see for yourself how Qwiet AI can help you identify F38 security vulnerabilities.