Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

dnf5

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

2
Related CVEsRelated VendorsRelated AssignersReports
2Vulnerabilities found

CVE-2024-1929
Assigner-Fedora Project
ShareView Details
Assigner-Fedora Project
CVSS Score-7.5||HIGH
EPSS-0.08% / 23.47%
||
7 Day CHG-0.03%
Published-08 May, 2024 | 01:53
Updated-25 Aug, 2025 | 13:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Root Exploit via Configuration Dictionary

Local Root Exploit via Configuration Dictionary in dnf5daemon-server before 5.1.17 allows a malicious user to impact Confidentiality and Integrity via Configuration Dictionary. There are issues with the D-Bus interface long before Polkit is invoked. The `org.rpm.dnf.v0.SessionManager.open_session` method takes a key/value map of configuration entries. A sub-entry in this map, placed under the "config" key, is another key/value map. The configuration values found in it will be forwarded as configuration overrides to the `libdnf5::Base` configuration.  Practically all libdnf5 configuration aspects can be influenced here. Already when opening the session via D-Bus, the libdnf5 will be initialized using these override configuration values. There is no sanity checking of the content of this "config" map, which is untrusted data. It is possible to make the library loading a plug-in shared library under control of an unprivileged user, hence achieving root access. 

Action-Not Available
Vendor-rpmfedoraFedora Project
Product-dnf5dnf5daemon-serverdnf5daemon-server
CWE ID-CWE-20
Improper Input Validation
CVE-2024-1930
Assigner-Fedora Project
ShareView Details
Assigner-Fedora Project
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.16%
||
7 Day CHG~0.00%
Published-08 May, 2024 | 01:52
Updated-07 Aug, 2025 | 17:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No Limit on Number of Open Sessions / Bad Session Close Behaviour

No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server before 5.1.17 allows a malicious user to impact Availability via No Limit on Number of Open Sessions. There is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method. For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.

Action-Not Available
Vendor-rpm-software-managementfedoraFedora Project
Product-dnf5dnf5daemon-serverdnf5daemon-server
CWE ID-CWE-400
Uncontrolled Resource Consumption