1 day 19 hours ago
Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, and Jörg Schwenk
discovered that Erlang OTP’s SSH module incorrect handled authentication. A
remote attacker could use this issue to execute arbitrary commands without
authentication, possibly leading to a system compromise.
1 day 20 hours ago
It was discovered that the Ruby CGI gem incorrectly handled parsing certain
cookies. A remote attacker could possibly use this issue to consume
resources, leading to a denial of service. (CVE-2025-27219)
It was discovered that the Ruby CGI gem incorrectly handled parsing certain
regular expressions. A remote attacker could possibly use this issue to
consume resources, leading to a denial of service. (CVE-2025-27220)
It was discovered that the Ruby URI gem incorrectly handled certain URI
handling methods. A remote attacker could possibly use this issue to leak
authentication credentials. (CVE-2025-27221)
It was discovered that the Ruby REXML gem incorrectly handled parsing XML
documents containing many digits in a hex numeric character reference. A
remote attacker could use this issue to consume resources, leading to a
denial of service. (CVE-2024-49761)
2 days 23 hours ago
It was discovered that the watch_queue event notification system contained
an out-of-bounds write vulnerability. A local attacker could use this to
cause a denial of service or escalate their privileges.)(CVE-2022-0995)
In the Linux kernel, the following vulnerability has been
resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show()
Skip sessions that are being teared down (status == SES_EXITING) to avoid
UAF.)(CVE-2024-26928)
In the Linux kernel, the following vulnerability has been
resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break()
Skip sessions that are being teared down (status == SES_EXITING) to avoid
UAF.)(CVE-2024-35864)
In the Linux kernel, the following vulnerability has been
resolved: HID: core: zero-initialize the report buffer Since the report
buffer is used by all kinds of drivers in various ways, let's zero-
initialize it during allocation to make sure that it can't be ever used to
leak kernel memory via specially-crafted report.)(CVE-2024-50302)
In the Linux kernel, the following vulnerability has been
resolved: media: dvbdev: prevent the risk of out of memory access The
dvbdev contains a static variable used to store dvb minors. The behavior of
it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set,
dvb_register_device() won't check for boundaries, as it will rely that a
previous call to dvb_register_adapter() would already be enforcing it. On a
similar way, dvb_device_open() uses the assumption that the register
functions already did the needed checks. This can be fragile if some device
ends using different calls. This also generate warnings on static check
analysers like Coverity. So, add explicit guards to prevent potential risk
of OOM issues.)(CVE-2024-53063)
In the Linux kernel, the following vulnerability has been
resolved: jfs: add a check to prevent array-index-out-of-bounds in
dbAdjTree When the value of lp is 0 at the beginning of the for loop, it
will become negative in the next assignment and we should bail out.)(CVE-2024-56595)
In the Linux kernel, the following vulnerability has been
resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online()
walks up the blkcg hierarchy putting the online pin. To walk up, it uses
blkcg_parent(blkcg) but it was calling that after
blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the
following UAF:
================================================================== BUG:
KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8
at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117
Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown
02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace:
dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100
blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480
process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0
kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30
... Freed by task 1944: kasan_save_track+0x2b/0x70
kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50
kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30
process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0
kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30
Note that the UAF is not easy to trigger as the free path is indirected
behind a couple RCU grace periods and a work item execution. I could only
trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it
by reading the parent pointer before destroying the blkcg's blkg's.)(CVE-2024-56672)
In the Linux kernel, the following vulnerability has been
resolved: drm/dp_mst: Ensure mst_primary pointer is valid in
drm_dp_mst_handle_up_req() While receiving an MST up request message from
one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed
from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing
mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This
could lead to a NULL deref/use-after-free of mst_primary in
drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for
mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing
the request if getting an mst_primary reference fails.)(CVE-2024-57798)
3 days 14 hours ago
It was discovered that QuickJS could be forced to reference uninitialized
memory in certain instances. An attacker could possibly use this issue to
cause QuickJS to crash, resulting in a denial of service, or execute
arbitrary code. (CVE-2023-48183)
It was discovered that QuickJS incorrectly managed memory in certain
circumstances. An attacker could possibly use this issue to exhaust
system resources, resulting in a denial of service. (CVE-2023-48184)
It was discovered that QuickJS could be forced to crash due to a
failing test. An attacker could possibly use this issue to cause a
denial of service. (CVE-2024-33263)
3 days 14 hours ago
Igor Pavlov discovered that 7-Zip had several memory-related issues.
An attacker could possibly use these issues to cause 7-Zip to crash,
resulting in a denial of service, or execute arbitrary code.
(CVE-2023-52168, CVE-2023-52169)
3 days 19 hours ago
USN-7161-1 and USN-7161-2 fixed CVE-2024-41110 for source package
docker.io in Ubuntu 18.04 LTS and for source package docker.io-app in
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10.
This update fixes it for source package docker.io in Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. These updates only
address the docker library and not the docker.io application itself, which
was already patched in the previous USNs (USN-7161-1 and USN-7161-2).
Original advisory details:
Yair Zak discovered that Docker could unexpectedly forward DNS requests
from internal networks in an unexpected manner. An attacker could possibly
use this issue to exfiltrate data by encoding information in DNS queries
to controlled nameservers. This issue was only addressed for the source
package docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018)
Cory Snider discovered that Docker did not properly handle authorization
plugin request processing. An attacker could possibly use this issue to
bypass authorization controls by forwarding API requests without their
full body, leading to unauthorized actions. This issue was only addressed
for the source package docker.io-app in Ubuntu 24.10 and
Ubuntu 24.04 LTS, and the source package docker.io in Ubuntu 18.04 LTS.
(CVE-2024-41110)
4 days 7 hours ago
It was discovered that the CImg library did not properly check the size
of images before loading them. An attacker could possibly use this issue
to cause a denial of service. This issue only affected Ubuntu 22.04 LTS.
(CVE-2022-1325)
It was discovered that the CImg library did not correctly handle certain
memory operations, which could lead to a buffer overflow. An attacker
could possibly use this issue to execute arbitrary code or cause a denial
of service. (CVE-2024-26540)
4 days 16 hours ago
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
4 days 19 hours ago
It was discovered that Protocol Buffers incorrectly handled memory when
receiving malicious input using the Java bindings. An attacker could
possibly use this issue to cause a denial of service.
4 days 21 hours ago
It was discovered that Perl incorrectly handled transliterating non-ASCII
bytes. A remote attacker could use this issue to cause Perl to crash,
resulting in a denial of service, or possibly execute arbitrary code.
3 weeks ago
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Cryptographic API;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- SPI subsystem;
- USB Gadget drivers;
- USB Serial drivers;
- USB Type-C Port Controller Manager driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- File systems infrastructure;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- Kernel init infrastructure;
- BPF subsystem;
- Kernel CPU control infrastructure;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- eXpress Data Path;
- SELinux security module;
- USB sound devices;
(CVE-2024-56532, CVE-2024-53127, CVE-2024-56574, CVE-2024-56576,
CVE-2024-57922, CVE-2024-53135, CVE-2024-56606, CVE-2024-53155,
CVE-2024-53136, CVE-2024-56769, CVE-2024-56690, CVE-2024-53150,
CVE-2024-38588, CVE-2024-53171, CVE-2024-56748, CVE-2024-56558,
CVE-2024-56595, CVE-2024-56670, CVE-2024-56637, CVE-2024-56739,
CVE-2024-56681, CVE-2024-53158, CVE-2024-53172, CVE-2024-56700,
CVE-2024-56645, CVE-2024-56723, CVE-2024-56572, CVE-2024-57889,
CVE-2024-43098, CVE-2024-56614, CVE-2024-53197, CVE-2025-21640,
CVE-2024-57938, CVE-2024-53140, CVE-2024-57929, CVE-2024-56593,
CVE-2024-56691, CVE-2025-21687, CVE-2024-56770, CVE-2024-53131,
CVE-2024-56531, CVE-2024-56603, CVE-2025-21653, CVE-2024-53239,
CVE-2024-57946, CVE-2024-56581, CVE-2024-56694, CVE-2024-56597,
CVE-2024-57849, CVE-2024-56601, CVE-2024-53156, CVE-2024-56747,
CVE-2024-53146, CVE-2025-21664, CVE-2024-53217, CVE-2025-21638,
CVE-2024-53157, CVE-2024-56688, CVE-2024-47707, CVE-2024-53173,
CVE-2024-56605, CVE-2024-56619, CVE-2024-49925, CVE-2024-49936,
CVE-2024-56586, CVE-2024-57892, CVE-2024-56562, CVE-2024-57902,
CVE-2024-53148, CVE-2024-53194, CVE-2024-56720, CVE-2024-53121,
CVE-2024-48881, CVE-2024-56767, CVE-2024-56780, CVE-2024-56548,
CVE-2024-57931, CVE-2024-56724, CVE-2024-53142, CVE-2024-53214,
CVE-2025-21639, CVE-2024-43900, CVE-2024-56659, CVE-2024-57908,
CVE-2024-57913, CVE-2024-53181, CVE-2024-56630, CVE-2024-56598,
CVE-2024-56539, CVE-2024-57951, CVE-2024-56600, CVE-2024-52332,
CVE-2024-55916, CVE-2024-53130, CVE-2024-56587, CVE-2024-57911,
CVE-2024-57901, CVE-2024-57807, CVE-2024-49996, CVE-2025-21697,
CVE-2024-53198, CVE-2024-53145, CVE-2024-57910, CVE-2022-49034,
CVE-2024-56629, CVE-2024-56570, CVE-2024-57948, CVE-2024-53227,
CVE-2024-56643, CVE-2024-56602, CVE-2024-57904, CVE-2024-56594,
CVE-2024-56615, CVE-2024-53690, CVE-2024-56650, CVE-2025-21699,
CVE-2024-56644, CVE-2024-56631, CVE-2024-53183, CVE-2024-50051,
CVE-2024-49884, CVE-2024-56569, CVE-2024-56596, CVE-2024-57912,
CVE-2024-56781, CVE-2024-57802, CVE-2024-56704, CVE-2024-57850,
CVE-2024-57906, CVE-2025-21678, CVE-2024-56634, CVE-2024-53138,
CVE-2021-47219, CVE-2024-57890, CVE-2024-53112, CVE-2024-53174,
CVE-2024-56756, CVE-2024-56779, CVE-2024-57884, CVE-2024-56746,
CVE-2024-53161, CVE-2024-57900, CVE-2024-56567, CVE-2024-56633,
CVE-2025-21694, CVE-2024-53165, CVE-2024-56642, CVE-2024-53184,
CVE-2024-44938, CVE-2024-53124, CVE-2025-21689, CVE-2024-53680)
3 weeks ago
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- Virtio block driver;
- TPM device driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I2C subsystem;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- LED subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- Virtio pmem driver;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- USB Device Class drivers;
- USB Gadget drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- File systems infrastructure;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- Network traffic control;
- Network sockets;
- TCP network protocol;
- Kernel init infrastructure;
- BPF subsystem;
- Kernel CPU control infrastructure;
- Perf events;
- Arbitrary resource management;
- Tracing infrastructure;
- Closures library;
- Memory management;
- 9P file system network protocol;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- Key management;
- SELinux security module;
- FireWire sound drivers;
- AudioScience HPI driver;
- Amlogic Meson SoC drivers;
- USB sound devices;
- KVM core;
(CVE-2024-49938, CVE-2024-41066, CVE-2024-57951, CVE-2024-56779,
CVE-2024-50194, CVE-2024-50265, CVE-2024-56596, CVE-2024-57922,
CVE-2024-56614, CVE-2024-57912, CVE-2024-50251, CVE-2024-56569,
CVE-2024-56587, CVE-2024-57807, CVE-2024-50051, CVE-2024-49997,
CVE-2024-57911, CVE-2024-50195, CVE-2024-50205, CVE-2024-35896,
CVE-2025-21689, CVE-2024-43098, CVE-2024-47757, CVE-2025-21639,
CVE-2024-57900, CVE-2024-56634, CVE-2024-50230, CVE-2024-57946,
CVE-2024-53059, CVE-2024-50290, CVE-2024-49985, CVE-2024-50142,
CVE-2024-49925, CVE-2024-50199, CVE-2024-47699, CVE-2024-53172,
CVE-2024-53173, CVE-2024-56631, CVE-2024-57938, CVE-2024-53101,
CVE-2024-53197, CVE-2024-49896, CVE-2024-47697, CVE-2024-56644,
CVE-2024-50236, CVE-2024-46731, CVE-2024-47674, CVE-2024-38544,
CVE-2024-46853, CVE-2024-47740, CVE-2024-53121, CVE-2024-50082,
CVE-2024-53165, CVE-2024-50040, CVE-2024-57929, CVE-2024-57889,
CVE-2024-49860, CVE-2024-50287, CVE-2022-49034, CVE-2024-56690,
CVE-2024-50302, CVE-2024-50006, CVE-2024-49949, CVE-2024-49868,
CVE-2024-49903, CVE-2024-47723, CVE-2024-49936, CVE-2024-49955,
CVE-2024-50234, CVE-2024-50301, CVE-2024-47670, CVE-2024-56574,
CVE-2024-50168, CVE-2024-57913, CVE-2024-56602, CVE-2024-56630,
CVE-2024-53130, CVE-2024-53145, CVE-2024-56642, CVE-2024-50202,
CVE-2024-38588, CVE-2024-56767, CVE-2024-50024, CVE-2024-53198,
CVE-2024-56548, CVE-2024-50184, CVE-2024-47756, CVE-2024-50167,
CVE-2025-21694, CVE-2024-53063, CVE-2024-49966, CVE-2024-50299,
CVE-2024-50143, CVE-2024-49924, CVE-2024-53061, CVE-2024-53124,
CVE-2024-49902, CVE-2024-56739, CVE-2024-49952, CVE-2025-21664,
CVE-2024-49877, CVE-2024-47701, CVE-2024-52332, CVE-2024-49975,
CVE-2024-56645, CVE-2024-53140, CVE-2024-49948, CVE-2024-56724,
CVE-2024-49963, CVE-2025-21687, CVE-2024-47698, CVE-2024-50039,
CVE-2024-56595, CVE-2024-50282, CVE-2023-52458, CVE-2024-56615,
CVE-2024-40965, CVE-2024-49965, CVE-2024-53112, CVE-2024-53135,
CVE-2024-56601, CVE-2024-56532, CVE-2024-53184, CVE-2024-47672,
CVE-2024-53155, CVE-2024-50171, CVE-2024-50035, CVE-2024-56704,
CVE-2024-53156, CVE-2024-47685, CVE-2024-50044, CVE-2024-47712,
CVE-2024-47707, CVE-2024-50179, CVE-2024-56594, CVE-2024-56688,
CVE-2024-50151, CVE-2025-21699, CVE-2024-56598, CVE-2024-47737,
CVE-2024-57849, CVE-2024-56576, CVE-2025-21638, CVE-2024-53181,
CVE-2024-50033, CVE-2024-49995, CVE-2024-56756, CVE-2024-49867,
CVE-2025-21697, CVE-2024-56600, CVE-2024-56670, CVE-2024-47713,
CVE-2024-46854, CVE-2024-47671, CVE-2024-53680, CVE-2024-49851,
CVE-2024-49883, CVE-2024-56780, CVE-2024-56770, CVE-2024-56650,
CVE-2024-53146, CVE-2024-50218, CVE-2024-56531, CVE-2024-47706,
CVE-2024-56572, CVE-2024-47709, CVE-2024-49958, CVE-2024-57948,
CVE-2024-40911, CVE-2024-57904, CVE-2024-56769, CVE-2024-35887,
CVE-2025-21678, CVE-2024-57802, CVE-2024-56700, CVE-2024-43900,
CVE-2024-47747, CVE-2024-50059, CVE-2024-56606, CVE-2024-53161,
CVE-2024-50116, CVE-2024-50180, CVE-2024-50127, CVE-2024-53131,
CVE-2024-53157, CVE-2024-50279, CVE-2024-57850, CVE-2024-56619,
CVE-2024-49982, CVE-2024-56748, CVE-2024-53104, CVE-2024-49981,
CVE-2024-56643, CVE-2024-49962, CVE-2024-50131, CVE-2024-56781,
CVE-2024-50233, CVE-2024-56597, CVE-2024-56567, CVE-2024-57902,
CVE-2024-43863, CVE-2024-56581, CVE-2024-53171, CVE-2024-56633,
CVE-2024-50296, CVE-2024-49879, CVE-2024-56593, CVE-2024-47679,
CVE-2024-53148, CVE-2024-50237, CVE-2024-49959, CVE-2024-50269,
CVE-2024-53138, CVE-2024-49957, CVE-2024-50278, CVE-2024-49894,
CVE-2024-49900, CVE-2024-56586, CVE-2024-50148, CVE-2024-50262,
CVE-2024-56720, CVE-2024-50096, CVE-2024-57931, CVE-2024-56681,
CVE-2021-47219, CVE-2025-21640, CVE-2024-56603, CVE-2024-50229,
CVE-2024-53174, CVE-2024-50007, CVE-2024-49944, CVE-2024-50273,
CVE-2024-49878, CVE-2024-56605, CVE-2024-53150, CVE-2024-44931,
CVE-2024-53214, CVE-2024-49882, CVE-2024-53158, CVE-2024-55916,
CVE-2024-50117, CVE-2024-56570, CVE-2024-44938, CVE-2024-53239,
CVE-2024-53217, CVE-2024-50099, CVE-2024-50267, CVE-2024-56562,
CVE-2024-40953, CVE-2024-57884, CVE-2024-49892, CVE-2024-56659,
CVE-2024-56746, CVE-2024-50074, CVE-2024-41016, CVE-2024-53142,
CVE-2024-57901, CVE-2024-56637, CVE-2024-47710, CVE-2024-46849,
CVE-2024-57910, CVE-2024-47692, CVE-2024-48881, CVE-2024-53194,
CVE-2024-56558, CVE-2024-56747, CVE-2024-56629, CVE-2024-47696,
CVE-2024-56691, CVE-2024-53227, CVE-2024-57908, CVE-2024-57892,
CVE-2024-53183, CVE-2024-56723, CVE-2024-42252, CVE-2024-57890,
CVE-2024-50134, CVE-2024-56694, CVE-2024-57906, CVE-2024-56539,
CVE-2024-53690, CVE-2024-53066, CVE-2024-49973, CVE-2024-47684,
CVE-2024-50045, CVE-2024-49884, CVE-2025-21653, CVE-2024-47749,
CVE-2024-47742, CVE-2024-50008, CVE-2024-50150, CVE-2024-53127,
CVE-2024-49996)
3 weeks ago
USN-7346-1 fixed vulnerabilities in OpenSC. The update introduced a
regression in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. The
security fix has been removed pending further investigation.
We apologize for the inconvenience.
Original advisory details:
It was discovered that OpenSC did not correctly handle certain memory
operations, which could lead to a use-after-free vulnerability. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-42780)
It was discovered that OpenSC did not correctly handle certain memory
operations, which could lead to a stack buffer overflow. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-42782)
It was discovered that OpenSC did not correctly handle the length of
certain buffers, which could lead to a out-of-bounds access vulnerability.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-2977)
Deepanjan Pal discovered that OpenSC did not correctly authenticate a zero
length PIN. A physically proximate attacker could possibly use this issue
to gain unauthorized access to certain systems. This issue only affected
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-40660)
It was discovered that OpenSC did not correctly handle certain memory
operations. A physically proximate attacker could possibly use this issue
to compromise key generation, certificate loading and other card
management operations. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-40661)
Hubert Kario, Michal Shagam and Eyal Ronen discovered that OpenSC had a
timing side-channel and incorrectly handled RSA padding. An attacker
could possibly use this issue to recover sensitive information. This issue
only affected Ubuntu 22.04 LTS. (CVE-2023-5992)
Matteo Marini discovered that OpenSC did not properly manage memory due to
certain uninitialized variables. A physically proximate attacker could
possibly use this issue to gain unauthorized access to certain systems.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-45615)
Matteo Marini discovered that OpenSC did not correctly handle certain
memory operations. A physically proximate attacker could possibly use this
issue to gain unauthorized access to certain systems. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and
Ubuntu 24.10. (CVE-2024-45616, CVE-2024-45617)
Matteo Marini discovered that OpenSC did not correctly handle certain
memory operations. A physically proximate attacker could possibly use this
issue to gain unauthorized access to certain systems.
(CVE-2024-45618, CVE-2024-45620)
Matteo Marini discovered that OpenSC did not correctly handle certain
memory operations. A physically proximate attacker could possibly use this
issue to gain unauthorized access to certain systems. This issue only
affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 24.10.
(CVE-2024-45619)
It was discovered that OpenSC did not correctly handle certain memory
operations, which could lead to a buffer overflow. A physically
proximate attacker could possibly use this issue to compromise card
management operations during enrollment and modification. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and
Ubuntu 24.10. (CVE-2024-8443)
3 weeks ago
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Cryptographic API;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- SPI subsystem;
- USB Gadget drivers;
- USB Serial drivers;
- USB Type-C Port Controller Manager driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- File systems infrastructure;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- Kernel init infrastructure;
- BPF subsystem;
- Kernel CPU control infrastructure;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- eXpress Data Path;
- SELinux security module;
- USB sound devices;
(CVE-2024-56532, CVE-2024-53127, CVE-2024-56574, CVE-2024-56576,
CVE-2024-57922, CVE-2024-53135, CVE-2024-56606, CVE-2024-53155,
CVE-2024-53136, CVE-2024-56769, CVE-2024-56690, CVE-2024-53150,
CVE-2024-38588, CVE-2024-53171, CVE-2024-56748, CVE-2024-56558,
CVE-2024-56595, CVE-2024-56670, CVE-2024-56637, CVE-2024-56739,
CVE-2024-56681, CVE-2024-53158, CVE-2024-53172, CVE-2024-56700,
CVE-2024-56645, CVE-2024-56723, CVE-2024-56572, CVE-2024-57889,
CVE-2024-43098, CVE-2024-56614, CVE-2024-53197, CVE-2025-21640,
CVE-2024-57938, CVE-2024-53140, CVE-2024-57929, CVE-2024-56593,
CVE-2024-56691, CVE-2025-21687, CVE-2024-56770, CVE-2024-53131,
CVE-2024-56531, CVE-2024-56603, CVE-2025-21653, CVE-2024-53239,
CVE-2024-57946, CVE-2024-56581, CVE-2024-56694, CVE-2024-56597,
CVE-2024-57849, CVE-2024-56601, CVE-2024-53156, CVE-2024-56747,
CVE-2024-53146, CVE-2025-21664, CVE-2024-53217, CVE-2025-21638,
CVE-2024-53157, CVE-2024-56688, CVE-2024-47707, CVE-2024-53173,
CVE-2024-56605, CVE-2024-56619, CVE-2024-49925, CVE-2024-49936,
CVE-2024-56586, CVE-2024-57892, CVE-2024-56562, CVE-2024-57902,
CVE-2024-53148, CVE-2024-53194, CVE-2024-56720, CVE-2024-53121,
CVE-2024-48881, CVE-2024-56767, CVE-2024-56780, CVE-2024-56548,
CVE-2024-57931, CVE-2024-56724, CVE-2024-53142, CVE-2024-53214,
CVE-2025-21639, CVE-2024-43900, CVE-2024-56659, CVE-2024-57908,
CVE-2024-57913, CVE-2024-53181, CVE-2024-56630, CVE-2024-56598,
CVE-2024-56539, CVE-2024-57951, CVE-2024-56600, CVE-2024-52332,
CVE-2024-55916, CVE-2024-53130, CVE-2024-56587, CVE-2024-57911,
CVE-2024-57901, CVE-2024-57807, CVE-2024-49996, CVE-2025-21697,
CVE-2024-53198, CVE-2024-53145, CVE-2024-57910, CVE-2022-49034,
CVE-2024-56629, CVE-2024-56570, CVE-2024-57948, CVE-2024-53227,
CVE-2024-56643, CVE-2024-56602, CVE-2024-57904, CVE-2024-56594,
CVE-2024-56615, CVE-2024-53690, CVE-2024-56650, CVE-2025-21699,
CVE-2024-56644, CVE-2024-56631, CVE-2024-53183, CVE-2024-50051,
CVE-2024-49884, CVE-2024-56569, CVE-2024-56596, CVE-2024-57912,
CVE-2024-56781, CVE-2024-57802, CVE-2024-56704, CVE-2024-57850,
CVE-2024-57906, CVE-2025-21678, CVE-2024-56634, CVE-2024-53138,
CVE-2021-47219, CVE-2024-57890, CVE-2024-53112, CVE-2024-53174,
CVE-2024-56756, CVE-2024-56779, CVE-2024-57884, CVE-2024-56746,
CVE-2024-53161, CVE-2024-57900, CVE-2024-56567, CVE-2024-56633,
CVE-2025-21694, CVE-2024-53165, CVE-2024-56642, CVE-2024-53184,
CVE-2024-44938, CVE-2024-53124, CVE-2025-21689, CVE-2024-53680)
3 weeks ago
Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Cryptographic API;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- SPI subsystem;
- USB Gadget drivers;
- USB Serial drivers;
- USB Type-C Port Controller Manager driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- File systems infrastructure;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- Kernel init infrastructure;
- BPF subsystem;
- Kernel CPU control infrastructure;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- eXpress Data Path;
- SELinux security module;
- USB sound devices;
(CVE-2024-53172, CVE-2024-56572, CVE-2024-56739, CVE-2024-56643,
CVE-2024-53131, CVE-2024-57904, CVE-2024-53145, CVE-2024-57908,
CVE-2024-53155, CVE-2024-56691, CVE-2024-57901, CVE-2024-56595,
CVE-2024-55916, CVE-2024-50051, CVE-2024-49936, CVE-2024-57900,
CVE-2024-53239, CVE-2024-53142, CVE-2024-57889, CVE-2024-53217,
CVE-2024-56619, CVE-2025-21653, CVE-2024-53140, CVE-2024-53130,
CVE-2024-43098, CVE-2024-56746, CVE-2024-56650, CVE-2024-56723,
CVE-2024-56558, CVE-2024-57884, CVE-2024-56601, CVE-2024-56581,
CVE-2024-57906, CVE-2024-57948, CVE-2024-49996, CVE-2024-56598,
CVE-2025-21638, CVE-2024-49925, CVE-2024-56767, CVE-2024-53127,
CVE-2024-53181, CVE-2024-53194, CVE-2024-57902, CVE-2024-56630,
CVE-2024-56567, CVE-2024-56602, CVE-2024-56562, CVE-2024-56596,
CVE-2024-56570, CVE-2024-56670, CVE-2024-53135, CVE-2024-56629,
CVE-2024-56769, CVE-2024-56637, CVE-2024-56681, CVE-2024-57910,
CVE-2024-57892, CVE-2024-56574, CVE-2024-53121, CVE-2024-56532,
CVE-2025-21689, CVE-2024-53156, CVE-2024-57912, CVE-2024-56597,
CVE-2025-21640, CVE-2024-53690, CVE-2024-56548, CVE-2024-56633,
CVE-2024-43900, CVE-2024-56631, CVE-2021-47219, CVE-2024-56659,
CVE-2024-53158, CVE-2025-21639, CVE-2024-53136, CVE-2024-56615,
CVE-2024-56586, CVE-2024-57946, CVE-2024-57911, CVE-2025-21699,
CVE-2025-21664, CVE-2024-53174, CVE-2024-53184, CVE-2024-53138,
CVE-2024-53680, CVE-2024-56593, CVE-2024-56644, CVE-2024-56720,
CVE-2024-53197, CVE-2024-57802, CVE-2024-53157, CVE-2024-56756,
CVE-2024-53171, CVE-2024-57931, CVE-2024-56600, CVE-2024-53112,
CVE-2024-56770, CVE-2024-53214, CVE-2024-57849, CVE-2024-57890,
CVE-2024-56634, CVE-2024-44938, CVE-2024-53183, CVE-2025-21697,
CVE-2024-57929, CVE-2024-53165, CVE-2024-53161, CVE-2024-53150,
CVE-2024-56606, CVE-2024-56748, CVE-2024-48881, CVE-2024-56594,
CVE-2024-56645, CVE-2024-56781, CVE-2024-56531, CVE-2024-56605,
CVE-2024-56779, CVE-2025-21678, CVE-2024-53227, CVE-2024-56688,
CVE-2024-56576, CVE-2024-56587, CVE-2024-53124, CVE-2024-49884,
CVE-2024-57850, CVE-2024-56569, CVE-2024-53148, CVE-2025-21694,
CVE-2024-56700, CVE-2024-53173, CVE-2024-53198, CVE-2024-52332,
CVE-2024-47707, CVE-2024-56539, CVE-2024-56704, CVE-2024-56747,
CVE-2025-21687, CVE-2024-56690, CVE-2022-49034, CVE-2024-57938,
CVE-2024-57951, CVE-2024-38588, CVE-2024-56603, CVE-2024-57807,
CVE-2024-56780, CVE-2024-57922, CVE-2024-56642, CVE-2024-57913,
CVE-2024-53146, CVE-2024-56614, CVE-2024-56694, CVE-2024-56724)
3 weeks ago
USN-7330-1 fixed vulnerabilities in Ansible. The update introduced a
regression when attempting to install Ansible on Ubuntu 16.04 LTS.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Ansible did not properly verify certain fields
of X.509 certificates. An attacker could possibly use this issue to
spoof SSL servers if they were able to intercept network communications.
This issue only affected Ubuntu 14.04 LTS. (CVE-2015-3908)
Martin Carpenter discovered that certain connection plugins for Ansible
did not properly restrict users. An attacker with local access could
possibly use this issue to escape a restricted environment via symbolic
links misuse. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-6240)
Robin Schneider discovered that Ansible's apt_key module did not properly
verify key fingerprints. A remote attacker could possibly use this issue
to perform key injection, leading to the access of sensitive information.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-8614)
It was discovered that Ansible would expose passwords in certain
instances. An attacker could possibly use specially crafted input
related to this issue to access sensitive information. This issue only
affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-10206)
It was discovered that Ansible incorrectly logged sensitive information.
An attacker with local access could possibly use this issue to access
sensitive information. This issue only affected Ubuntu 14.04 LTS, Ubuntu
16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2019-14846)
It was discovered that Ansible's solaris_zone module accepted input
without performing input checking. A remote attacker could possibly use
this issue to enable the execution of arbitrary code. This issue only
affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-14904)
It was discovered that Ansible did not generate sufficiently random
values, which could lead to the exposure of passwords. An attacker
could possibly use this issue to access sensitive information. This
issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2020-10729)
It was discovered that Ansible's svn module could disclose passwords to
users within the same node. An attacker could possibly use this issue to
access sensitive information. (CVE-2020-1739)
3 weeks ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- RAM backed block device driver;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- i.MX SoC drivers;
- QCOM SoC drivers;
- SPI subsystem;
- Media staging drivers;
- UFS subsystem;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Serial drivers;
- USB Type-C Port Controller Manager driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- Kernel init infrastructure;
- BPF subsystem;
- Kernel CPU control infrastructure;
- DMA mapping infrastructure;
- KCSAN framework;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- HSR network protocol;
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- VMware vSockets driver;
- eXpress Data Path;
- SELinux security module;
- ALSA framework;
- USB sound devices;
(CVE-2024-56558, CVE-2024-53227, CVE-2024-53130, CVE-2025-21664,
CVE-2024-53142, CVE-2024-55881, CVE-2024-57906, CVE-2024-46809,
CVE-2024-53198, CVE-2024-53184, CVE-2024-53237, CVE-2024-56770,
CVE-2024-53150, CVE-2024-56700, CVE-2024-50242, CVE-2024-53181,
CVE-2024-56574, CVE-2024-56681, CVE-2024-56678, CVE-2024-53119,
CVE-2024-53129, CVE-2024-56567, CVE-2024-56688, CVE-2024-49925,
CVE-2025-21687, CVE-2024-56643, CVE-2025-21631, CVE-2024-52332,
CVE-2024-53226, CVE-2025-21665, CVE-2024-56615, CVE-2024-57911,
CVE-2024-53136, CVE-2024-56603, CVE-2024-56690, CVE-2024-47730,
CVE-2024-56586, CVE-2024-46784, CVE-2024-56596, CVE-2024-53172,
CVE-2024-57901, CVE-2024-56693, CVE-2024-56605, CVE-2024-57896,
CVE-2024-56698, CVE-2024-56724, CVE-2024-49998, CVE-2024-53239,
CVE-2024-53206, CVE-2024-56636, CVE-2024-56597, CVE-2024-56533,
CVE-2024-42315, CVE-2024-56701, CVE-2024-56587, CVE-2024-57791,
CVE-2024-56619, CVE-2024-50051, CVE-2024-56569, CVE-2025-21694,
CVE-2025-21699, CVE-2024-53214, CVE-2024-57904, CVE-2024-49571,
CVE-2024-56754, CVE-2024-56572, CVE-2024-49974, CVE-2024-53140,
CVE-2025-21639, CVE-2024-56369, CVE-2024-56601, CVE-2024-56642,
CVE-2024-57792, CVE-2024-57838, CVE-2024-53127, CVE-2025-21690,
CVE-2024-56548, CVE-2024-53155, CVE-2024-47143, CVE-2024-56691,
CVE-2024-57938, CVE-2025-21692, CVE-2024-56648, CVE-2024-46841,
CVE-2024-57807, CVE-2024-57908, CVE-2024-50121, CVE-2024-57841,
CVE-2024-53135, CVE-2024-53180, CVE-2025-21683, CVE-2024-56568,
CVE-2024-56575, CVE-2024-56774, CVE-2024-56589, CVE-2024-36899,
CVE-2024-57889, CVE-2024-50275, CVE-2024-56606, CVE-2024-56578,
CVE-2024-56726, CVE-2024-36476, CVE-2024-53122, CVE-2024-56594,
CVE-2024-56562, CVE-2024-53690, CVE-2024-56769, CVE-2024-57910,
CVE-2024-56720, CVE-2024-56581, CVE-2024-56723, CVE-2025-21669,
CVE-2024-56627, CVE-2024-57925, CVE-2024-56600, CVE-2024-56631,
CVE-2024-56595, CVE-2024-53685, CVE-2024-53157, CVE-2024-57931,
CVE-2024-56644, CVE-2024-53215, CVE-2024-57897, CVE-2024-56748,
CVE-2024-53138, CVE-2025-21646, CVE-2024-47707, CVE-2024-56781,
CVE-2024-57922, CVE-2024-53197, CVE-2024-56777, CVE-2024-56625,
CVE-2024-56650, CVE-2024-56704, CVE-2025-21638, CVE-2024-56623,
CVE-2024-57890, CVE-2024-56630, CVE-2024-53680, CVE-2025-21637,
CVE-2024-56539, CVE-2024-56532, CVE-2024-53217, CVE-2024-53120,
CVE-2024-56780, CVE-2022-49034, CVE-2024-43098, CVE-2024-56590,
CVE-2024-50283, CVE-2024-57917, CVE-2024-56776, CVE-2024-53151,
CVE-2024-49950, CVE-2024-57850, CVE-2024-44938, CVE-2024-47408,
CVE-2024-56778, CVE-2024-56779, CVE-2024-56637, CVE-2024-56640,
CVE-2024-57907, CVE-2024-57940, CVE-2025-21697, CVE-2024-57946,
CVE-2024-53156, CVE-2024-56759, CVE-2024-53146, CVE-2024-56610,
CVE-2024-56670, CVE-2024-57912, CVE-2024-57874, CVE-2024-57884,
CVE-2024-56745, CVE-2024-56715, CVE-2024-56746, CVE-2024-53112,
CVE-2024-53145, CVE-2024-56614, CVE-2024-53174, CVE-2024-57849,
CVE-2024-56767, CVE-2024-53173, CVE-2025-21689, CVE-2024-56739,
CVE-2024-56694, CVE-2024-57939, CVE-2024-56622, CVE-2024-56570,
CVE-2024-56634, CVE-2024-53161, CVE-2024-53121, CVE-2024-56705,
CVE-2024-56756, CVE-2024-53183, CVE-2024-56629, CVE-2025-21636,
CVE-2024-56763, CVE-2024-56593, CVE-2025-21640, CVE-2024-53148,
CVE-2025-21678, CVE-2024-56602, CVE-2024-57882, CVE-2024-56576,
CVE-2024-53096, CVE-2024-53165, CVE-2024-57903, CVE-2024-57802,
CVE-2025-21653, CVE-2024-56662, CVE-2024-56626, CVE-2024-56645,
CVE-2024-48881, CVE-2024-57892, CVE-2024-56531, CVE-2024-56716,
CVE-2024-56787, CVE-2024-57929, CVE-2024-50055, CVE-2024-49996,
CVE-2024-53171, CVE-2025-21648, CVE-2024-57948, CVE-2024-53099,
CVE-2024-56785, CVE-2024-57913, CVE-2024-53131, CVE-2024-53194,
CVE-2024-56659, CVE-2024-55916, CVE-2024-56616, CVE-2024-56728,
CVE-2024-43900, CVE-2025-21680, CVE-2024-53113, CVE-2024-58087,
CVE-2024-56598, CVE-2024-57902, CVE-2024-56679, CVE-2025-21666,
CVE-2024-57951, CVE-2024-56708, CVE-2024-56633, CVE-2024-56747,
CVE-2024-53125, CVE-2024-45828, CVE-2024-53124, CVE-2024-46871,
CVE-2024-57900, CVE-2024-50304, CVE-2024-53158)
3 weeks ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- RAM backed block device driver;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- i.MX SoC drivers;
- QCOM SoC drivers;
- SPI subsystem;
- Media staging drivers;
- UFS subsystem;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Serial drivers;
- USB Type-C Port Controller Manager driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- Kernel init infrastructure;
- BPF subsystem;
- Kernel CPU control infrastructure;
- DMA mapping infrastructure;
- KCSAN framework;
- Tracing infrastructure;
- Memory management;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- HSR network protocol;
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- VMware vSockets driver;
- eXpress Data Path;
- SELinux security module;
- ALSA framework;
- USB sound devices;
(CVE-2024-56558, CVE-2024-53227, CVE-2024-53130, CVE-2025-21664,
CVE-2024-53142, CVE-2024-55881, CVE-2024-57906, CVE-2024-46809,
CVE-2024-53198, CVE-2024-53184, CVE-2024-53237, CVE-2024-56770,
CVE-2024-53150, CVE-2024-56700, CVE-2024-50242, CVE-2024-53181,
CVE-2024-56574, CVE-2024-56681, CVE-2024-56678, CVE-2024-53119,
CVE-2024-53129, CVE-2024-56567, CVE-2024-56688, CVE-2024-49925,
CVE-2025-21687, CVE-2024-56643, CVE-2025-21631, CVE-2024-52332,
CVE-2024-53226, CVE-2025-21665, CVE-2024-56615, CVE-2024-57911,
CVE-2024-53136, CVE-2024-56603, CVE-2024-56690, CVE-2024-47730,
CVE-2024-56586, CVE-2024-46784, CVE-2024-56596, CVE-2024-53172,
CVE-2024-57901, CVE-2024-56693, CVE-2024-56605, CVE-2024-57896,
CVE-2024-56698, CVE-2024-56724, CVE-2024-49998, CVE-2024-53239,
CVE-2024-53206, CVE-2024-56636, CVE-2024-56597, CVE-2024-56533,
CVE-2024-42315, CVE-2024-56701, CVE-2024-56587, CVE-2024-57791,
CVE-2024-56619, CVE-2024-50051, CVE-2024-56569, CVE-2025-21694,
CVE-2025-21699, CVE-2024-53214, CVE-2024-57904, CVE-2024-49571,
CVE-2024-56754, CVE-2024-56572, CVE-2024-49974, CVE-2024-53140,
CVE-2025-21639, CVE-2024-56369, CVE-2024-56601, CVE-2024-56642,
CVE-2024-57792, CVE-2024-57838, CVE-2024-53127, CVE-2025-21690,
CVE-2024-56548, CVE-2024-53155, CVE-2024-47143, CVE-2024-56691,
CVE-2024-57938, CVE-2025-21692, CVE-2024-56648, CVE-2024-46841,
CVE-2024-57807, CVE-2024-57908, CVE-2024-50121, CVE-2024-57841,
CVE-2024-53135, CVE-2024-53180, CVE-2025-21683, CVE-2024-56568,
CVE-2024-56575, CVE-2024-56774, CVE-2024-56589, CVE-2024-36899,
CVE-2024-57889, CVE-2024-50275, CVE-2024-56606, CVE-2024-56578,
CVE-2024-56726, CVE-2024-36476, CVE-2024-53122, CVE-2024-56594,
CVE-2024-56562, CVE-2024-53690, CVE-2024-56769, CVE-2024-57910,
CVE-2024-56720, CVE-2024-56581, CVE-2024-56723, CVE-2025-21669,
CVE-2024-56627, CVE-2024-57925, CVE-2024-56600, CVE-2024-56631,
CVE-2024-56595, CVE-2024-53685, CVE-2024-53157, CVE-2024-57931,
CVE-2024-56644, CVE-2024-53215, CVE-2024-57897, CVE-2024-56748,
CVE-2024-53138, CVE-2025-21646, CVE-2024-47707, CVE-2024-56781,
CVE-2024-57922, CVE-2024-53197, CVE-2024-56777, CVE-2024-56625,
CVE-2024-56650, CVE-2024-56704, CVE-2025-21638, CVE-2024-56623,
CVE-2024-57890, CVE-2024-56630, CVE-2024-53680, CVE-2025-21637,
CVE-2024-56539, CVE-2024-56532, CVE-2024-53217, CVE-2024-53120,
CVE-2024-56780, CVE-2022-49034, CVE-2024-43098, CVE-2024-56590,
CVE-2024-50283, CVE-2024-57917, CVE-2024-56776, CVE-2024-53151,
CVE-2024-49950, CVE-2024-57850, CVE-2024-44938, CVE-2024-47408,
CVE-2024-56778, CVE-2024-56779, CVE-2024-56637, CVE-2024-56640,
CVE-2024-57907, CVE-2024-57940, CVE-2025-21697, CVE-2024-57946,
CVE-2024-53156, CVE-2024-56759, CVE-2024-53146, CVE-2024-56610,
CVE-2024-56670, CVE-2024-57912, CVE-2024-57874, CVE-2024-57884,
CVE-2024-56745, CVE-2024-56715, CVE-2024-56746, CVE-2024-53112,
CVE-2024-53145, CVE-2024-56614, CVE-2024-53174, CVE-2024-57849,
CVE-2024-56767, CVE-2024-53173, CVE-2025-21689, CVE-2024-56739,
CVE-2024-56694, CVE-2024-57939, CVE-2024-56622, CVE-2024-56570,
CVE-2024-56634, CVE-2024-53161, CVE-2024-53121, CVE-2024-56705,
CVE-2024-56756, CVE-2024-53183, CVE-2024-56629, CVE-2025-21636,
CVE-2024-56763, CVE-2024-56593, CVE-2025-21640, CVE-2024-53148,
CVE-2025-21678, CVE-2024-56602, CVE-2024-57882, CVE-2024-56576,
CVE-2024-53096, CVE-2024-53165, CVE-2024-57903, CVE-2024-57802,
CVE-2025-21653, CVE-2024-56662, CVE-2024-56626, CVE-2024-56645,
CVE-2024-48881, CVE-2024-57892, CVE-2024-56531, CVE-2024-56716,
CVE-2024-56787, CVE-2024-57929, CVE-2024-50055, CVE-2024-49996,
CVE-2024-53171, CVE-2025-21648, CVE-2024-57948, CVE-2024-53099,
CVE-2024-56785, CVE-2024-57913, CVE-2024-53131, CVE-2024-53194,
CVE-2024-56659, CVE-2024-55916, CVE-2024-56616, CVE-2024-56728,
CVE-2024-43900, CVE-2025-21680, CVE-2024-53113, CVE-2024-58087,
CVE-2024-56598, CVE-2024-57902, CVE-2024-56679, CVE-2025-21666,
CVE-2024-57951, CVE-2024-56708, CVE-2024-56633, CVE-2024-56747,
CVE-2024-53125, CVE-2024-45828, CVE-2024-53124, CVE-2024-46871,
CVE-2024-57900, CVE-2024-50304, CVE-2024-53158)
3 weeks ago
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- RAM backed block device driver;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I2C subsystem;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- STMicroelectronics network drivers;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- i.MX SoC drivers;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Media staging drivers;
- TCM subsystem;
- TTY drivers;
- UFS subsystem;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- User-space API (UAPI);
- Kernel init infrastructure;
- io_uring subsystem;
- BPF subsystem;
- Kernel CPU control infrastructure;
- DMA mapping infrastructure;
- KCSAN framework;
- Tracing infrastructure;
- Closures library;
- Memory management;
- 9P file system network protocol;
- Amateur Radio drivers;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- HSR network protocol;
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- VMware vSockets driver;
- eXpress Data Path;
- XFRM subsystem;
- Key management;
- SELinux security module;
- ALSA framework;
- FireWire sound drivers;
- HD-audio driver;
- QCOM ASoC drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
- KVM core;
(CVE-2024-50299, CVE-2024-50304, CVE-2024-50196, CVE-2024-56548,
CVE-2024-56531, CVE-2024-56720, CVE-2024-58087, CVE-2024-50116,
CVE-2024-56590, CVE-2024-56589, CVE-2024-53172, CVE-2025-21687,
CVE-2024-57925, CVE-2024-56640, CVE-2024-57896, CVE-2024-56739,
CVE-2024-56622, CVE-2024-53173, CVE-2024-56610, CVE-2024-56787,
CVE-2025-21690, CVE-2024-50259, CVE-2024-50278, CVE-2024-53685,
CVE-2024-50099, CVE-2024-56616, CVE-2024-53181, CVE-2024-56643,
CVE-2024-49950, CVE-2024-53119, CVE-2024-50257, CVE-2024-56777,
CVE-2024-49998, CVE-2024-56629, CVE-2024-56728, CVE-2024-56601,
CVE-2024-56776, CVE-2024-46809, CVE-2024-53061, CVE-2024-50273,
CVE-2024-45828, CVE-2024-53161, CVE-2024-56700, CVE-2024-50103,
CVE-2024-50156, CVE-2024-53150, CVE-2024-50237, CVE-2024-46841,
CVE-2024-56636, CVE-2024-56572, CVE-2024-50290, CVE-2024-57913,
CVE-2024-56698, CVE-2024-56690, CVE-2024-56568, CVE-2024-57911,
CVE-2024-49974, CVE-2024-47707, CVE-2024-53059, CVE-2024-50244,
CVE-2024-57874, CVE-2024-56539, CVE-2024-53145, CVE-2024-56602,
CVE-2024-50115, CVE-2024-56726, CVE-2024-53157, CVE-2024-41080,
CVE-2024-57938, CVE-2024-56569, CVE-2024-50171, CVE-2024-57807,
CVE-2024-57890, CVE-2024-53122, CVE-2024-56746, CVE-2024-53135,
CVE-2024-53063, CVE-2024-57922, CVE-2024-53130, CVE-2024-53174,
CVE-2024-56774, CVE-2024-56606, CVE-2024-56648, CVE-2024-50160,
CVE-2024-50262, CVE-2024-50163, CVE-2024-53112, CVE-2024-50234,
CVE-2024-56576, CVE-2025-21664, CVE-2024-53113, CVE-2024-56625,
CVE-2024-50154, CVE-2024-56662, CVE-2024-56645, CVE-2024-56778,
CVE-2024-40953, CVE-2024-50055, CVE-2024-40965, CVE-2024-56627,
CVE-2024-43900, CVE-2024-56578, CVE-2024-50202, CVE-2024-56670,
CVE-2024-56705, CVE-2024-53103, CVE-2024-57948, CVE-2024-53197,
CVE-2024-56704, CVE-2024-50101, CVE-2024-53180, CVE-2024-56769,
CVE-2024-53171, CVE-2024-56558, CVE-2024-53042, CVE-2024-50051,
CVE-2024-42291, CVE-2024-39497, CVE-2024-53183, CVE-2024-43098,
CVE-2024-57904, CVE-2024-56615, CVE-2024-50086, CVE-2024-53239,
CVE-2024-50127, CVE-2024-50134, CVE-2024-53148, CVE-2024-47408,
CVE-2024-50279, CVE-2024-50292, CVE-2024-53099, CVE-2024-50121,
CVE-2024-56567, CVE-2024-53146, CVE-2024-53052, CVE-2024-53120,
CVE-2024-56678, CVE-2024-50282, CVE-2024-50249, CVE-2024-56623,
CVE-2024-56701, CVE-2024-56708, CVE-2024-56763, CVE-2024-50209,
CVE-2025-21639, CVE-2024-50230, CVE-2024-53096, CVE-2024-47730,
CVE-2024-42252, CVE-2024-57849, CVE-2024-56587, CVE-2024-56614,
CVE-2024-56369, CVE-2024-57838, CVE-2025-21653, CVE-2024-57792,
CVE-2024-53140, CVE-2024-56780, CVE-2024-50218, CVE-2024-56767,
CVE-2024-49571, CVE-2024-57910, CVE-2024-50269, CVE-2024-56630,
CVE-2024-52332, CVE-2024-56693, CVE-2024-50148, CVE-2025-21648,
CVE-2024-49996, CVE-2024-50085, CVE-2024-56688, CVE-2024-53125,
CVE-2024-53129, CVE-2024-55916, CVE-2024-57900, CVE-2024-57903,
CVE-2024-57939, CVE-2024-50010, CVE-2024-50265, CVE-2023-52913,
CVE-2024-36476, CVE-2024-56574, CVE-2025-21636, CVE-2024-57912,
CVE-2024-56642, CVE-2024-50287, CVE-2024-36899, CVE-2024-53131,
CVE-2024-56595, CVE-2024-53058, CVE-2024-46871, CVE-2024-56586,
CVE-2024-53198, CVE-2025-21699, CVE-2024-50082, CVE-2024-53194,
CVE-2024-57901, CVE-2024-50199, CVE-2024-57802, CVE-2024-53138,
CVE-2024-53124, CVE-2024-50167, CVE-2024-56597, CVE-2024-50233,
CVE-2024-49925, CVE-2024-56781, CVE-2024-53127, CVE-2025-21680,
CVE-2024-53165, CVE-2024-53227, CVE-2024-56672, CVE-2024-55881,
CVE-2024-53184, CVE-2024-50198, CVE-2024-42315, CVE-2024-57931,
CVE-2024-56694, CVE-2024-57951, CVE-2024-56659, CVE-2024-50247,
CVE-2024-53690, CVE-2024-56650, CVE-2024-57889, CVE-2024-53097,
CVE-2024-50072, CVE-2024-50267, CVE-2024-53066, CVE-2024-50153,
CVE-2024-50194, CVE-2024-56681, CVE-2025-21692, CVE-2024-50131,
CVE-2024-57884, CVE-2024-56748, CVE-2024-48881, CVE-2024-56593,
CVE-2024-50162, CVE-2024-44938, CVE-2024-50128, CVE-2024-50275,
CVE-2025-21638, CVE-2024-56634, CVE-2024-56679, CVE-2024-47143,
CVE-2024-50251, CVE-2024-56570, CVE-2024-53156, CVE-2024-50205,
CVE-2024-56747, CVE-2024-53121, CVE-2024-50208, CVE-2024-57841,
CVE-2024-56575, CVE-2024-57791, CVE-2024-57897, CVE-2024-56626,
CVE-2024-35887, CVE-2024-50302, CVE-2024-50242, CVE-2024-56756,
CVE-2024-53217, CVE-2025-21669, CVE-2024-56603, CVE-2024-56785,
CVE-2024-57917, CVE-2024-50058, CVE-2024-57902, CVE-2024-53215,
CVE-2024-50229, CVE-2024-50295, CVE-2024-56633, CVE-2024-50151,
CVE-2024-53214, CVE-2024-50232, CVE-2024-53158, CVE-2024-56715,
CVE-2024-50182, CVE-2025-21631, CVE-2024-53104, CVE-2024-53101,
CVE-2024-57908, CVE-2024-53055, CVE-2024-50143, CVE-2025-21646,
CVE-2024-56605, CVE-2025-21640, CVE-2024-56779, CVE-2024-50296,
CVE-2024-50201, CVE-2024-56691, CVE-2024-57882, CVE-2024-53141,
CVE-2024-56600, CVE-2025-21689, CVE-2024-26718, CVE-2024-56596,
CVE-2024-53151, CVE-2024-50083, CVE-2024-50283, CVE-2024-56532,
CVE-2024-53226, CVE-2024-56637, CVE-2024-50193, CVE-2024-56644,
CVE-2025-21637, CVE-2024-56716, CVE-2024-53680, CVE-2024-57907,
CVE-2022-49034, CVE-2024-50150, CVE-2024-56723, CVE-2025-21665,
CVE-2024-56759, CVE-2024-50301, CVE-2024-57929, CVE-2024-53164,
CVE-2024-56754, CVE-2024-53237, CVE-2025-21694, CVE-2024-56770,
CVE-2024-50141, CVE-2024-50192, CVE-2024-56581, CVE-2024-57892,
CVE-2024-53142, CVE-2024-50268, CVE-2024-53088, CVE-2025-21683,
CVE-2024-56724, CVE-2024-41066, CVE-2024-46784, CVE-2024-50074,
CVE-2024-57906, CVE-2024-57850, CVE-2024-50036, CVE-2024-57946,
CVE-2024-50117, CVE-2024-56594, CVE-2024-56619, CVE-2024-56598,
CVE-2024-56533, CVE-2024-56562, CVE-2024-57940, CVE-2024-56745,
CVE-2024-53155, CVE-2024-50236, CVE-2025-21666, CVE-2025-21697,
CVE-2024-50185, CVE-2024-56631, CVE-2024-50195, CVE-2024-50245,
CVE-2024-50110, CVE-2025-21678, CVE-2024-50142)
3 weeks ago
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- RAM backed block device driver;
- Virtio block driver;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCPI message protocol;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- Microsoft Hyper-V drivers;
- I2C subsystem;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- LED subsystem;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Microsoft Azure Network Adapter (MANA) driver;
- STMicroelectronics network drivers;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- Pin controllers subsystem;
- x86 platform drivers;
- Power supply drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- i.MX SoC drivers;
- QCOM SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Media staging drivers;
- TCM subsystem;
- TTY drivers;
- UFS subsystem;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- USB Type-C Connector System Software Interface driver;
- VFIO drivers;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- F2FS file system;
- GFS2 file system;
- JFFS2 file system;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- UBI file system;
- Timer subsystem;
- VLANs driver;
- LAPB network protocol;
- User-space API (UAPI);
- Kernel init infrastructure;
- io_uring subsystem;
- BPF subsystem;
- Kernel CPU control infrastructure;
- DMA mapping infrastructure;
- KCSAN framework;
- Tracing infrastructure;
- Closures library;
- Memory management;
- 9P file system network protocol;
- Amateur Radio drivers;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- HSR network protocol;
- IEEE802154.4 network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- Netfilter;
- Netlink;
- NET/ROM layer;
- Packet sockets;
- Network traffic control;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- VMware vSockets driver;
- eXpress Data Path;
- XFRM subsystem;
- Key management;
- SELinux security module;
- ALSA framework;
- FireWire sound drivers;
- HD-audio driver;
- QCOM ASoC drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
- KVM core;
(CVE-2025-21640, CVE-2024-56625, CVE-2024-53104, CVE-2024-53055,
CVE-2024-26718, CVE-2024-53180, CVE-2024-50257, CVE-2024-53174,
CVE-2024-53680, CVE-2024-56670, CVE-2024-56606, CVE-2024-53156,
CVE-2024-53112, CVE-2024-57940, CVE-2024-57807, CVE-2024-50259,
CVE-2024-53172, CVE-2024-53214, CVE-2024-50275, CVE-2024-56770,
CVE-2025-21666, CVE-2024-53101, CVE-2024-56630, CVE-2025-21638,
CVE-2024-50199, CVE-2024-56705, CVE-2024-56619, CVE-2024-50115,
CVE-2024-50209, CVE-2024-50116, CVE-2024-57908, CVE-2024-50242,
CVE-2024-50128, CVE-2024-50247, CVE-2024-56626, CVE-2024-56693,
CVE-2024-56648, CVE-2024-56745, CVE-2024-42252, CVE-2024-53088,
CVE-2024-50251, CVE-2024-57889, CVE-2024-53150, CVE-2024-53066,
CVE-2024-56569, CVE-2025-21697, CVE-2024-50185, CVE-2024-53158,
CVE-2024-50168, CVE-2024-41066, CVE-2024-53145, CVE-2024-50171,
CVE-2024-53135, CVE-2024-42315, CVE-2024-56615, CVE-2024-50230,
CVE-2024-50299, CVE-2024-53140, CVE-2024-56704, CVE-2024-56533,
CVE-2024-50121, CVE-2024-39497, CVE-2024-50282, CVE-2024-56715,
CVE-2024-56779, CVE-2024-56769, CVE-2024-56570, CVE-2024-55916,
CVE-2024-56637, CVE-2025-21694, CVE-2024-56691, CVE-2024-50301,
CVE-2024-50156, CVE-2024-57903, CVE-2025-21636, CVE-2024-49974,
CVE-2024-56532, CVE-2024-50201, CVE-2024-57929, CVE-2024-56590,
CVE-2024-57882, CVE-2024-57925, CVE-2024-56759, CVE-2024-56726,
CVE-2024-53215, CVE-2024-53121, CVE-2024-57912, CVE-2024-53119,
CVE-2024-57931, CVE-2024-41080, CVE-2024-35887, CVE-2024-53173,
CVE-2024-50245, CVE-2024-50267, CVE-2024-56627, CVE-2024-50085,
CVE-2024-56756, CVE-2024-50232, CVE-2024-56636, CVE-2024-56581,
CVE-2024-53194, CVE-2025-21689, CVE-2024-53226, CVE-2024-53239,
CVE-2024-56662, CVE-2024-50205, CVE-2024-53127, CVE-2024-56586,
CVE-2024-56603, CVE-2024-53122, CVE-2025-21699, CVE-2024-56568,
CVE-2024-57884, CVE-2024-53113, CVE-2024-56574, CVE-2025-21669,
CVE-2024-53125, CVE-2024-56748, CVE-2024-56575, CVE-2024-56640,
CVE-2024-57901, CVE-2022-49034, CVE-2024-56728, CVE-2024-57910,
CVE-2024-40965, CVE-2024-36899, CVE-2024-50131, CVE-2024-42291,
CVE-2024-50233, CVE-2024-57791, CVE-2024-57948, CVE-2024-56633,
CVE-2025-21653, CVE-2024-50287, CVE-2024-56724, CVE-2024-57907,
CVE-2024-49925, CVE-2024-47730, CVE-2024-46841, CVE-2024-56716,
CVE-2024-44938, CVE-2024-49950, CVE-2024-53131, CVE-2024-46809,
CVE-2024-50074, CVE-2024-50167, CVE-2024-53171, CVE-2024-57911,
CVE-2025-21680, CVE-2024-53059, CVE-2024-53161, CVE-2024-47707,
CVE-2025-21683, CVE-2024-56597, CVE-2024-53184, CVE-2024-56562,
CVE-2024-47143, CVE-2024-50103, CVE-2024-53138, CVE-2025-21639,
CVE-2024-50182, CVE-2024-36476, CVE-2024-50099, CVE-2024-50194,
CVE-2024-50163, CVE-2024-43098, CVE-2023-52913, CVE-2024-56708,
CVE-2024-53130, CVE-2024-56587, CVE-2024-57951, CVE-2024-57938,
CVE-2024-57917, CVE-2024-53063, CVE-2024-50148, CVE-2024-50229,
CVE-2024-56763, CVE-2024-50101, CVE-2024-57939, CVE-2024-57874,
CVE-2024-56778, CVE-2024-56701, CVE-2024-56672, CVE-2024-56598,
CVE-2024-45828, CVE-2024-50208, CVE-2024-53129, CVE-2024-56754,
CVE-2024-50141, CVE-2024-56539, CVE-2024-56720, CVE-2024-53165,
CVE-2024-50234, CVE-2024-53120, CVE-2024-50192, CVE-2024-50283,
CVE-2024-50160, CVE-2024-57922, CVE-2024-53052, CVE-2024-48881,
CVE-2024-56596, CVE-2024-50202, CVE-2025-21646, CVE-2024-50082,
CVE-2024-50278, CVE-2024-57904, CVE-2024-56602, CVE-2024-57913,
CVE-2024-50151, CVE-2025-21690, CVE-2024-53690, CVE-2024-56739,
CVE-2024-56594, CVE-2024-53155, CVE-2024-56694, CVE-2024-56767,
CVE-2024-50117, CVE-2024-56634, CVE-2024-47408, CVE-2024-53124,
CVE-2024-50292, CVE-2024-56576, CVE-2024-57841, CVE-2024-57902,
CVE-2024-57849, CVE-2024-50196, CVE-2024-56629, CVE-2024-57792,
CVE-2024-56605, CVE-2024-57896, CVE-2025-21664, CVE-2024-53142,
CVE-2025-21665, CVE-2024-50249, CVE-2024-50290, CVE-2024-56688,
CVE-2024-53096, CVE-2024-53061, CVE-2024-56622, CVE-2024-50110,
CVE-2024-56777, CVE-2024-58087, CVE-2024-56600, CVE-2024-56601,
CVE-2024-56645, CVE-2024-56572, CVE-2024-56723, CVE-2024-50195,
CVE-2024-56595, CVE-2024-56698, CVE-2024-57906, CVE-2024-52332,
CVE-2024-53099, CVE-2024-56787, CVE-2025-21687, CVE-2024-53141,
CVE-2024-53058, CVE-2024-49998, CVE-2024-53103, CVE-2024-56642,
CVE-2024-50058, CVE-2024-53151, CVE-2024-50162, CVE-2024-53164,
CVE-2024-56643, CVE-2024-56610, CVE-2024-50302, CVE-2024-57900,
CVE-2024-50083, CVE-2024-50072, CVE-2024-53227, CVE-2024-53183,
CVE-2024-56690, CVE-2024-50142, CVE-2024-50127, CVE-2024-50134,
CVE-2024-56700, CVE-2024-53198, CVE-2024-56781, CVE-2024-57897,
CVE-2024-56774, CVE-2024-50269, CVE-2025-21678, CVE-2024-46784,
CVE-2024-53685, CVE-2024-56593, CVE-2024-50051, CVE-2024-57890,
CVE-2024-53197, CVE-2024-50198, CVE-2024-50279, CVE-2024-57802,
CVE-2024-56578, CVE-2024-50154, CVE-2024-56623, CVE-2024-56776,
CVE-2024-56681, CVE-2024-53157, CVE-2024-57850, CVE-2024-57946,
CVE-2024-53148, CVE-2024-53042, CVE-2024-53181, CVE-2024-57892,
CVE-2024-50153, CVE-2024-50265, CVE-2025-21631, CVE-2025-21692,
CVE-2024-56558, CVE-2024-56747, CVE-2024-50304, CVE-2024-50244,
CVE-2024-43900, CVE-2024-56746, CVE-2024-56631, CVE-2024-56644,
CVE-2024-50262, CVE-2024-49571, CVE-2024-50296, CVE-2024-56614,
CVE-2024-50036, CVE-2024-50273, CVE-2024-56659, CVE-2024-56650,
CVE-2024-50236, CVE-2024-50268, CVE-2025-21637, CVE-2025-21648,
CVE-2024-53097, CVE-2024-56678, CVE-2024-56780, CVE-2024-50010,
CVE-2024-46871, CVE-2024-50237, CVE-2024-57838, CVE-2024-49996,
CVE-2024-50055, CVE-2024-50143, CVE-2024-53146, CVE-2024-50150,
CVE-2024-50193, CVE-2024-56567, CVE-2024-50086, CVE-2024-50295,
CVE-2024-50218, CVE-2024-40953, CVE-2024-56616, CVE-2024-56548,
CVE-2024-56531, CVE-2024-56679, CVE-2024-56785, CVE-2024-53217,
CVE-2024-53237, CVE-2024-56369, CVE-2024-55881, CVE-2024-56589)