# NewNet Lithium SMSC | OS Security Update Release Notes

---

**OS Security Update Release Notes**
Release Date: April 2026
OS Update Cycle: 202604 (yyyyMM)
Document Version: 1.0

---

## Table of Contents

1. Introduction
   - 1.1 About this Document
   - 1.2 Scope
   - 1.3 Intended Audience
2. Summary
3. CVEs Addressed
4. RPM Packages
5. Known Issues
6. Conclusion
7. Method of Procedure (MoP)

---

## 1. Introduction

### 1.1 About this Document

This document details the OS-level security updates applied to NewNet Lithium SMSC nodes in the 202604 update cycle. It lists the CVEs addressed and the RPM packages used to remediate them.

### 1.2 Scope

This update covers RHEL8 security patches only. No Lithium application-layer changes are included. Packages were sourced from the Red Hat subscription network and delivered via the NewNet managed RPM pipeline.

### 1.3 Intended Audience

- **Maintenance Engineers** – for applying OS patches and troubleshooting.
- **Network Operators** – for scheduling maintenance windows.
- **Security Teams** – for audit and compliance tracking.

---

## 2. Summary

This OS update addresses **1044** CVE(s) detected in the 202604 scan cycle.

| Item | Value |
|------|-------|
| Update cycle | 202604 |
| CVEs addressed | 1044 |
| RPM packages updated | 210 |
| RHEL version | 8.x |
| Critical | 30 |
| High | 338 |
| Medium | 575 |
| Low | 30 |
| N/A (no CVSS v3) | 71 |

---

## 3. CVEs Addressed

| CVE ID | Severity | CVSS Score | Affected Package(s) | Description | Link |
|--------|----------|-----------|---------------------|-------------|------|
| CVE-2025-68121 | CRITICAL | 10.0 | rhc | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68121) |
| CVE-2025-6965 | CRITICAL | 9.8 | sqlite, sqlite-libs | There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-6965) |
| CVE-2025-68615 | CRITICAL | 9.8 | net-snmp, net-snmp-agent-libs, net-snmp-libs, net-snmp-perl, net-snmp-utils | net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68615) |
| CVE-2024-6602 | CRITICAL | 9.8 | unknown | A mismatch between allocator and deallocator could have led to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-6602) |
| CVE-2024-52533 | CRITICAL | 9.8 | glib2 | gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-52533) |
| CVE-2024-47615 | CRITICAL | 9.8 | gstreamer1-plugins-base | GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47615) |
| CVE-2024-47607 | CRITICAL | 9.8 | gstreamer1-plugins-base | GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow has been detected in the gst_opus_dec_parse_header. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47607) |
| CVE-2024-47538 | CRITICAL | 9.8 | gstreamer1-plugins-base | GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47538) |
| CVE-2024-45492 | CRITICAL | 9.8 | expat | An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-45492) |
| CVE-2024-45491 | CRITICAL | 9.8 | expat | An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-45491) |
| CVE-2024-39331 | CRITICAL | 9.8 | emacs-filesystem | In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39331) |
| CVE-2024-38541 | CRITICAL | 9.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias() In of_modalias(), if the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38541) |
| CVE-2024-38476 | CRITICAL | 9.8 | httpd, httpd-filesystem, httpd-tools, mod_ssl | Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38476) |
| CVE-2024-38474 | CRITICAL | 9.8 | httpd, httpd-filesystem, httpd-tools, mod_ssl | Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38474) |
| CVE-2021-47548 | CRITICAL | 9.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47548) |
| CVE-2020-26154 | CRITICAL | 9.8 | unknown | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-26154) |
| CVE-2019-12900 | CRITICAL | 9.8 | bzip2, bzip2, bzip2-libs, bzip2-libs | BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2019-12900) |
| CVE-2025-4517 | CRITICAL | 9.4 | platform-python, python3-libs | Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-4517) |
| CVE-2025-49796 | CRITICAL | 9.1 | libxml2 | A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-49796) |
| CVE-2025-49794 | CRITICAL | 9.1 | libxml2 | A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-49794) |
| CVE-2025-23048 | CRITICAL | 9.1 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-23048) |
| CVE-2024-5535 | CRITICAL | 9.1 | mysql-common, mysql-libs, openssl, openssl-libs | Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-5535) |
| CVE-2024-38475 | CRITICAL | 9.1 | httpd, httpd-filesystem, httpd-tools, mod_ssl | Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38475) |
| CVE-2024-38428 | CRITICAL | 9.1 | wget | url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38428) |
| CVE-2024-37371 | CRITICAL | 9.1 | krb5-libs, mysql-common, mysql-libs | In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) |
| CVE-2024-36896 | CRITICAL | 9.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix access violation during port device removal Testing with KASAN and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36896) |
| CVE-2024-35960 | CRITICAL | 9.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Properly link new fs rules into the tree Previously, add_rule_fg would.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35960) |
| CVE-2024-35845 | CRITICAL | 9.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: dbg-tlv: ensure NUL termination The iwl_fw_ini_debug_info_tlv is... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35845) |
| CVE-2023-52832 | CRITICAL | 9.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() We can get a. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52832) |
| CVE-2024-3596 | CRITICAL | 9.0 | krb5-libs | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-3596) |
| CVE-2026-23193 | HIGH | 8.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23193) |
| CVE-2025-9900 | HIGH | 8.8 | libtiff | A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-9900) |
| CVE-2025-47273 | HIGH | 8.8 | platform-python-setuptools, python3-setuptools, python3-setuptools-wheel | setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-47273) |
| CVE-2025-1244 | HIGH | 8.8 | emacs-filesystem | A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-1244) |
| CVE-2025-11561 | HIGH | 8.8 | libipa_hbac, libsss_autofs, libsss_certmap, libsss_idmap, libsss_nss_idmap, libsss_sudo, python3-sssdconfig, sssd, sssd-ad, sssd-client, sssd-common, sssd-common-pac, sssd-ipa, sssd-kcm, sssd-krb5, sssd-krb5-common, sssd-ldap, sssd-nfs-idmap, sssd-proxy | A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations,... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-11561) |
| CVE-2024-35854 | HIGH | 8.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash The rehash...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35854) |
| CVE-2024-35814 | HIGH | 8.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: swiotlb: Fix double-allocation of slots due to broken alignment handling Commit... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35814) |
| CVE-2024-25744 | HIGH | 8.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-25744) |
| CVE-2023-52798 | HIGH | 8.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix dfs radar event locking The ath11k active pdevs are protected... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52798) |
| CVE-2016-9840 | HIGH | 8.8 | rsync | inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2016-9840) |
| CVE-2024-47175 | HIGH | 8.6 | cups-client, cups-libs | CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47175) |
| CVE-2024-39936 | HIGH | 8.6 | qt5-qtbase, qt5-qtbase-common, qt5-qtbase-gui | An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39936) |
| CVE-2024-32487 | HIGH | 8.6 | less | less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-32487) |
| CVE-2024-2398 | HIGH | 8.6 | curl, libcurl | When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-2398) |
| CVE-2022-48754 | HIGH | 8.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free Commit bafbdd527d56 ("phylib: Add device...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48754) |
| CVE-2021-47456 | HIGH | 8.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: can: peak_pci: peak_pci_remove(): fix UAF When remove the module peek_pci,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47456) |
| CVE-2025-58098 | HIGH | 8.3 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-58098) |
| CVE-2023-43758 | HIGH | 8.2 | unknown | Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-43758) |
| CVE-2026-25646 | HIGH | 8.1 | libpng | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-25646) |
| CVE-2025-5318 | HIGH | 8.1 | libssh, libssh-config | A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-5318) |
| CVE-2025-50106 | HIGH | 8.1 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50106) |
| CVE-2025-30749 | HIGH | 8.1 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30749) |
| CVE-2025-27363 | HIGH | 8.1 | freetype | An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-27363) |
| CVE-2024-5564 | HIGH | 8.1 | libndp | A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-5564) |
| CVE-2024-38473 | HIGH | 8.1 | httpd, httpd-filesystem, httpd-tools, mod_ssl | Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38473) |
| CVE-2024-33599 | HIGH | 8.1 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-33599) |
| CVE-2022-49043 | HIGH | 8.1 | libxml2 | xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49043) |
| CVE-2020-13790 | HIGH | 8.1 | libjpeg-turbo | libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-13790) |
| CVE-2019-17543 | HIGH | 8.1 | lz4-libs | LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2019-17543) |
| CVE-2025-58060 | HIGH | 8.0 | cups-client, cups-libs | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-58060) |
| CVE-2024-1488 | HIGH | 8.0 | python3-unbound, unbound-libs | A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-1488) |
| CVE-2022-50386 | HIGH | 8.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix user-after-free This uses l2cap_chan_hold_unless_zero()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50386) |
| CVE-2026-23231 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23231) |
| CVE-2026-23209 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23209) |
| CVE-2026-23074 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of teql. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23074) |
| CVE-2026-23001 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23001) |
| CVE-2025-8941 | HIGH | 7.8 | pam, pam-devel | A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-8941) |
| CVE-2025-7425 | HIGH | 7.8 | libxml2 | A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-7425) |
| CVE-2025-71238 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-71238) |
| CVE-2025-68973 | HIGH | 7.8 | gnupg2, gnupg2-smime | In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68973) |
| CVE-2025-61662 | HIGH | 7.8 | grub2-common, grub2-pc, grub2-pc-modules, grub2-tools, grub2-tools-extra, grub2-tools-minimal | A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-61662) |
| CVE-2025-6020 | HIGH | 7.8 | pam, pam, pam-devel, pam-devel | A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-6020) |
| CVE-2025-5914 | HIGH | 7.8 | libarchive | A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-5914) |
| CVE-2025-4802 | HIGH | 7.8 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-4802) |
| CVE-2025-39955 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39955) |
| CVE-2025-39864 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix use-after-free in cmp_bss() Following bss_free() quirk...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39864) |
| CVE-2025-39849 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39849) |
| CVE-2025-39841 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39841) |
| CVE-2025-39730 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39730) |
| CVE-2025-38724 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() Lei Lu...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38724) |
| CVE-2025-38718 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sctp: linearize cloned gso packets in sctp_rcv A cloned head skb still shares...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38718) |
| CVE-2025-38527 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free in cifs_oplock_break A race condition can occur... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38527) |
| CVE-2025-38464 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_conn_close(). syzbot reported a null-ptr-deref... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38464) |
| CVE-2025-38459 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix infinite recursive call of clip_push(). syzbot reported the splat.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38459) |
| CVE-2025-38415 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Squashfs: check return result of sb_min_blocksize Syzkaller reports an "UBSAN:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38415) |
| CVE-2025-38403 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vsock/vmci: Clear the vmci transport packet properly when initializing it In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38403) |
| CVE-2025-38350 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38350) |
| CVE-2025-38250 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix use-after-free in vhci_flush() syzbot reported...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38250) |
| CVE-2025-38248 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bridge: mcast: Fix use-after-free during router port configuration The bridge...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38248) |
| CVE-2025-38211 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38211) |
| CVE-2025-38180 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38180) |
| CVE-2025-38129 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38129) |
| CVE-2025-38079 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38079) |
| CVE-2025-38052 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38052) |
| CVE-2025-38024 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug Call Trace:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38024) |
| CVE-2025-38022 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38022) |
| CVE-2025-37914 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-37914) |
| CVE-2025-37890 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-37890) |
| CVE-2025-37823 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-37823) |
| CVE-2025-37797 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-37797) |
| CVE-2025-37738 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: ignore xattrs past end Once inside 'ext4_xattr_inode_dec_ref_all' we should. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-37738) |
| CVE-2025-24928 | HIGH | 7.8 | libxml2 | libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-24928) |
| CVE-2025-24855 | HIGH | 7.8 | libxslt | numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-24855) |
| CVE-2025-22097 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22097) |
| CVE-2025-22020 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22020) |
| CVE-2025-22004 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22004) |
| CVE-2025-21991 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21991) |
| CVE-2025-21928 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() The system can. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21928) |
| CVE-2025-21919 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21919) |
| CVE-2025-21785 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21785) |
| CVE-2025-21764 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21764) |
| CVE-2025-21759 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: extend RCU protection in igmp6_send() igmp6_send() can be called...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21759) |
| CVE-2025-21756 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21756) |
| CVE-2025-21727 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder A bug was found when run ltp test: BUG: KASAN:.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21727) |
| CVE-2024-9287 | HIGH | 7.8 | platform-python, python3-libs | A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-9287) |
| CVE-2024-58002 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Remove dangling pointers When an async control is written, we...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-58002) |
| CVE-2024-57980 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-57980) |
| CVE-2024-57979 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-57979) |
| CVE-2024-56171 | HIGH | 7.8 | libxml2 | libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-56171) |
| CVE-2024-55549 | HIGH | 7.8 | libxslt | xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-55549) |
| CVE-2024-53920 | HIGH | 7.8 | emacs-filesystem | In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53920) |
| CVE-2024-53197 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53197) |
| CVE-2024-53141 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53141) |
| CVE-2024-53104 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53104) |
| CVE-2024-50264 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50264) |
| CVE-2024-45026 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix error recovery leading to data corruption on ESE devices Extent...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-45026) |
| CVE-2024-4453 | HIGH | 7.8 | gstreamer1-plugins-base | GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-4453) |
| CVE-2024-43842 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43842) |
| CVE-2024-43830 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: leds: trigger: Unregister sysfs attributes before calling deactivate() Triggers... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43830) |
| CVE-2024-42301 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: dev/parport: fix the array out-of-bounds risk Fixed array out-of-bounds issues...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42301) |
| CVE-2024-42284 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str(). | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42284) |
| CVE-2024-42159 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask,... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42159) |
| CVE-2024-41092 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: Fix potential UAF by revoke of fence registers CI has been...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41092) |
| CVE-2024-41042 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prefer nft_chain_validate nft_chain_validate already...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41042) |
| CVE-2024-41039 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix overflow checking of wmfw header Fix the checking that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41039) |
| CVE-2024-40989 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Disassociate vcpus from redistributor region on teardown When tearing. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40989) |
| CVE-2024-40974 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Enforce hcall result buffer validity and size plpar_hcall(),...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40974) |
| CVE-2024-40958 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40958) |
| CVE-2024-40954 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40954) |
| CVE-2024-40927 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xhci: Handle TD clearing for multiple streams case When multiple streams are in... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40927) |
| CVE-2024-40906 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Always stop health timer during driver removal Currently, if...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40906) |
| CVE-2024-40901 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory There is a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40901) |
| CVE-2024-39502 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ionic: fix use after netif_napi_del() When queues are started, netif_napi_add()... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39502) |
| CVE-2024-38627 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev)... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38627) |
| CVE-2024-38586 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: r8169: Fix possible ring buffer corruption on fragmented Tx packets. An issue was. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38586) |
| CVE-2024-38581 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/mes: fix use-after-free issue Delete fence fallback timer to fix the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38581) |
| CVE-2024-38570 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38570) |
| CVE-2024-38555 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Discard command completions in internal error Fix use after free when... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38555) |
| CVE-2024-36979 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: bridge: mst: fix vlan use-after-free syzbot reported a suspicious rcu...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36979) |
| CVE-2024-36978 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: sched: sch_multiq: fix possible OOB write in multiq_tune() q->bands will be.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36978) |
| CVE-2024-36971 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36971) |
| CVE-2024-36940 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable() The "pctldev" struct is.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36940) |
| CVE-2024-36921 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: guard against invalid STA ID on removal Guard against invalid. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36921) |
| CVE-2024-36904 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). Anderson Nascimento...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36904) |
| CVE-2024-36886 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: fix UAF in error path Sam Page (sam4k) working with Trend Micro Zero Day...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36886) |
| CVE-2024-35855 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update The.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35855) |
| CVE-2024-35847 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Prevent double free on error The error handling path in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35847) |
| CVE-2024-35789 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes When moving a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35789) |
| CVE-2024-27395 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu, which is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27395) |
| CVE-2024-27065 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27065) |
| CVE-2024-27043 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: edia: dvbdev: fix a use-after-free In dvb_register_device, *pdvbdev is set. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27043) |
| CVE-2024-26961 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mac802154: fix llsec key resources release in mac802154_llsec_key_del...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26961) |
| CVE-2024-26958 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nfs: fix UAF in direct writes In production we have been hitting the following...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26958) |
| CVE-2024-26934 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in usb_deauthorize_interface() Among the attribute file... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26934) |
| CVE-2024-26933 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in port "disable" sysfs attribute The show and store...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26933) |
| CVE-2024-26907 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix fortify source warning while accessing Eth segment ------------[... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26907) |
| CVE-2024-26892 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921e: fix use-after-free in free_irq() From commit a304e1b82808...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26892) |
| CVE-2024-26852 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26852) |
| CVE-2024-26782 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: fix double-free on socket dismantle when MPTCP server accepts an incoming.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26782) |
| CVE-2024-26704 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: fix double-free of blocks due to wrong extents moved_len In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26704) |
| CVE-2024-26694 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix double-free bug The storage for the TLV PC register data...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26694) |
| CVE-2024-26610 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix a memory corruption iwl_fw_ini_trigger_tlv::data is a pointer.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26610) |
| CVE-2023-6597 | HIGH | 7.8 | platform-python, python3-libs | An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-6597) |
| CVE-2023-6040 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-6040) |
| CVE-2023-53673 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: call disconnect callback before deleting conn In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53673) |
| CVE-2023-53621 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: memcontrol: ensure memcg acquired by id is properly set up In the eviction...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53621) |
| CVE-2023-53552 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53552) |
| CVE-2023-53386 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix potential use-after-free when clear keys Similar to commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53386) |
| CVE-2023-53373 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53373) |
| CVE-2023-53305 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix use-after-free Fix potential use-after-free in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53305) |
| CVE-2023-53257 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check S1G action frame size Before checking the action code,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53257) |
| CVE-2023-52922 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52922) |
| CVE-2023-52864 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: platform/x86: wmi: Fix opening of char device Since commit fa1f68db6ca7...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52864) |
| CVE-2023-52840 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52840) |
| CVE-2023-52835 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: perf/core: Bail out early if the request AUX area is out of bound When...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52835) |
| CVE-2023-52796 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipvlan: add ipvlan_route_v6_outbound() helper Inspired by syzbot reports using a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52796) |
| CVE-2023-52777 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix gtk offload status event locking The ath11k active pdevs are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52777) |
| CVE-2023-52775 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/smc: avoid data corruption caused by decline We found a data corruption issue. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52775) |
| CVE-2023-52764 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: gspca: cpia1: shift-out-of-bounds in set_flicker Syzkaller reported the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52764) |
| CVE-2023-52707 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sched/psi: Fix use-after-free in ep_remove_wait_queue() If a non-root cgroup gets. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52707) |
| CVE-2023-52679 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: of: Fix double free in of_parse_phandle_with_args_map In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52679) |
| CVE-2023-52669 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: crypto: s390/aes - Fix buffer overread in CTR mode When processing the last...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52669) |
| CVE-2023-52667 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a potential double-free in fs_any_create_groups When kcalloc() for. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52667) |
| CVE-2023-52594 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus(). | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52594) |
| CVE-2023-52530 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free When ieee80211_key_link() is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52530) |
| CVE-2023-52469 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drivers/amd/pm: fix a use-after-free in kv_parse_power_table When ps allocated by. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52469) |
| CVE-2023-52464 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52464) |
| CVE-2023-52451 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/memhp: Fix access beyond end of drmem array...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52451) |
| CVE-2023-52445 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix use after free on context disconnection Upon module load, a... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52445) |
| CVE-2023-52439 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open core-1\t\t\t\tcore-2...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52439) |
| CVE-2022-50543 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix mr->map double free rxe_mr_cleanup() which tries to free mr->map...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50543) |
| CVE-2022-50367 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fs: fix UAF/GPF bug in nilfs_mdt_destroy In alloc_inode, inode_init_always()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50367) |
| CVE-2022-50087 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50087) |
| CVE-2022-50072 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFSv4/pnfs: Fix a use-after-free bug in open If someone cancels the open RPC...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50072) |
| CVE-2022-49846 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() Syzbot reported a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49846) |
| CVE-2022-49136 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49136) |
| CVE-2022-49111 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use after free in hci_send_acl This fixes the following trace...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49111) |
| CVE-2022-49058 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49058) |
| CVE-2022-48919 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: fix double free race when mount fails in cifs_get_root() When...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48919) |
| CVE-2022-48632 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48632) |
| CVE-2022-48624 | HIGH | 7.8 | less | close_altfile in filename.c in less before 606 omits shell_quote calls for...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48624) |
| CVE-2022-48622 | HIGH | 7.8 | gdk-pixbuf2, gdk-pixbuf2-modules | In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48622) |
| CVE-2021-47670 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb),... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47670) |
| CVE-2021-47609 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47609) |
| CVE-2021-47497 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells If a cell has 'nbits'.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47497) |
| CVE-2021-47386 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47386) |
| CVE-2021-47352 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: virtio-net: Add validation for used length This adds validation for used length... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47352) |
| CVE-2021-47338 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fbmem: Do not delete the mode that is still in use The execution of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47338) |
| CVE-2021-47321 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free by calling del_timer_sync() This driver's... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47321) |
| CVE-2021-47311 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: qcom/emac: fix UAF in emac_remove adpt is netdev private data and it cannot.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47311) |
| CVE-2021-47310 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: ti: fix UAF in tlan_remove_one priv is netdev private data and it cannot be.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47310) |
| CVE-2021-47118 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: pid: take a reference when initializing `cad_pid` During boot,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47118) |
| CVE-2021-47013 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47013) |
| CVE-2021-46984 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: kyber: fix out of bounds access when preempted __blk_mq_sched_bio_merge() gets...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-46984) |
| CVE-2020-16156 | HIGH | 7.8 | perl-CPAN | CPAN 2.28 allows Signature Verification...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-16156) |
| CVE-2019-25162 | HIGH | 7.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after we are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2019-25162) |
| CVE-2025-13601 | HIGH | 7.7 | glib2 | A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-13601) |
| CVE-2024-36016 | HIGH | 7.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following:.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36016) |
| CVE-2021-47356 | HIGH | 7.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible use-after-free in HFC_cleanup() This module's remove path...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47356) |
| CVE-2025-0624 | HIGH | 7.6 | grub2-common, grub2-pc, grub2-pc-modules, grub2-tools, grub2-tools-extra, grub2-tools-minimal | A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-0624) |
| CVE-2024-3661 | HIGH | 7.6 | NetworkManager, NetworkManager-libnm, NetworkManager-team, NetworkManager-tui | DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-3661) |
| CVE-2026-22998 | HIGH | 7.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec Commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-22998) |
| CVE-2026-21945 | HIGH | 7.5 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21945) |
| CVE-2026-21441 | HIGH | 7.5 | python3-urllib3 | urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21441) |
| CVE-2026-0915 | HIGH | 7.5 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-0915) |
| CVE-2025-9230 | HIGH | 7.5 | openssl, openssl-libs | Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-9230) |
| CVE-2025-9086 | HIGH | 7.5 | curl, libcurl | 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-9086) |
| CVE-2025-8194 | HIGH | 7.5 | platform-python, python3-libs | There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-8194) |
| CVE-2025-7345 | HIGH | 7.5 | gdk-pixbuf2, gdk-pixbuf2-modules | A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-7345) |
| CVE-2025-66471 | HIGH | 7.5 | python3-urllib3 | urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-66471) |
| CVE-2025-66418 | HIGH | 7.5 | python3-urllib3 | urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-66418) |
| CVE-2025-61729 | HIGH | 7.5 | rhc | Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-61729) |
| CVE-2025-61726 | HIGH | 7.5 | rhc | The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-61726) |
| CVE-2025-6021 | HIGH | 7.5 | libxml2 | A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-6021) |
| CVE-2025-59375 | HIGH | 7.5 | expat | libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-59375) |
| CVE-2025-55753 | HIGH | 7.5 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-55753) |
| CVE-2025-53066 | HIGH | 7.5 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53066) |
| CVE-2025-49630 | HIGH | 7.5 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-49630) |
| CVE-2025-4435 | HIGH | 7.5 | platform-python, python3-libs | When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-4435) |
| CVE-2025-4330 | HIGH | 7.5 | platform-python, python3-libs | Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-4330) |
| CVE-2025-4138 | HIGH | 7.5 | platform-python, python3-libs | Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-4138) |
| CVE-2025-21521 | HIGH | 7.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21521) |
| CVE-2025-15281 | HIGH | 7.5 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-15281) |
| CVE-2024-8176 | HIGH | 7.5 | expat | A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-8176) |
| CVE-2024-7006 | HIGH | 7.5 | libtiff | A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-7006) |
| CVE-2024-6232 | HIGH | 7.5 | platform-python, python3-libs | There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-6232) |
| CVE-2024-47252 | HIGH | 7.5 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47252) |
| CVE-2024-45490 | HIGH | 7.5 | expat | An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-45490) |
| CVE-2024-42225 | HIGH | 7.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: replace skb_put with skb_put_zero Avoid potentially reusing...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42225) |
| CVE-2024-4032 | HIGH | 7.5 | platform-python, python3-libs | The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable”.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-4032) |
| CVE-2024-39573 | HIGH | 7.5 | httpd, httpd-filesystem, httpd-tools, mod_ssl | Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39573) |
| CVE-2024-38573 | HIGH | 7.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cppc_cpufreq: Fix possible null pointer dereference cppc_cpufreq_get_rate() and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38573) |
| CVE-2024-38477 | HIGH | 7.5 | httpd, httpd-filesystem, httpd-tools, mod_ssl | null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38477) |
| CVE-2024-37370 | HIGH | 7.5 | krb5-libs | In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-37370) |
| CVE-2024-3651 | HIGH | 7.5 | python3-idna | A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-3651) |
| CVE-2024-29214 | HIGH | 7.5 | unknown | Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-29214) |
| CVE-2024-28757 | HIGH | 7.5 | expat | libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-28757) |
| CVE-2024-28127 | HIGH | 7.5 | unknown | Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-28127) |
| CVE-2024-26461 | HIGH | 7.5 | krb5-libs | Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26461) |
| CVE-2024-25062 | HIGH | 7.5 | libxml2 | An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-25062) |
| CVE-2024-24582 | HIGH | 7.5 | unknown | Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-24582) |
| CVE-2024-21823 | HIGH | 7.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21823) |
| CVE-2024-12085 | HIGH | 7.5 | rsync | A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12085) |
| CVE-2023-52356 | HIGH | 7.5 | libtiff | A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52356) |
| CVE-2023-37920 | HIGH | 7.5 | unknown | Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) |
| CVE-2023-34440 | HIGH | 7.5 | unknown | Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-34440) |
| CVE-2023-31315 | HIGH | 7.5 | iwl100-firmware, iwl1000-firmware, iwl105-firmware, iwl135-firmware, iwl2000-firmware, iwl2030-firmware, iwl3160-firmware, iwl5000-firmware, iwl5150-firmware, iwl6000-firmware, iwl6000g2a-firmware, iwl6050-firmware, iwl7260-firmware, linux-firmware | Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-31315) |
| CVE-2023-2953 | HIGH | 7.5 | openldap | A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-2953) |
| CVE-2022-48747 | HIGH | 7.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: block: Fix wrong offset in bio_truncate() bio_truncate() clears the buffer...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48747) |
| CVE-2022-3064 | HIGH | 7.5 | rhc | Parsing malicious or large YAML documents can consume excessive amounts of CPU or...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-3064) |
| CVE-2022-23990 | HIGH | 7.5 | expat | Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-23990) |
| CVE-2020-25219 | HIGH | 7.5 | unknown | url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-25219) |
| CVE-2025-69419 | HIGH | 7.4 | openssl, openssl-libs | Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-69419) |
| CVE-2025-49812 | HIGH | 7.4 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-49812) |
| CVE-2025-38352 | HIGH | 7.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38352) |
| CVE-2025-21587 | HIGH | 7.4 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21587) |
| CVE-2024-33602 | HIGH | 7.4 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-33602) |
| CVE-2024-27052 | HIGH | 7.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27052) |
| CVE-2024-21147 | HIGH | 7.4 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21147) |
| CVE-2024-20952 | HIGH | 7.4 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-20952) |
| CVE-2024-20918 | HIGH | 7.4 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-20918) |
| CVE-2024-10963 | HIGH | 7.4 | pam, pam-devel | A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-10963) |
| CVE-2023-0286 | HIGH | 7.4 | compat-openssl10 | There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-0286) |
| CVE-2024-33601 | HIGH | 7.3 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-33601) |
| CVE-2024-2961 | HIGH | 7.3 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-2961) |
| CVE-2024-2947 | HIGH | 7.3 | cockpit, cockpit-bridge, cockpit-system, cockpit-ws | A flaw was found in Cockpit. Deleting a sosreport with a crafted name via the Cockpit web interface can lead to a command injection vulnerability,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-2947) |
| CVE-2023-38709 | HIGH | 7.3 | httpd, httpd-filesystem, httpd-tools, mod_ssl | Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-38709) |
| CVE-2021-47441 | HIGH | 7.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: thermal: Fix out-of-bounds memory accesses Currently, mlxsw allows cooling. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47441) |
| CVE-2026-23204 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23204) |
| CVE-2025-66293 | HIGH | 7.1 | libpng | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-66293) |
| CVE-2025-65018 | HIGH | 7.1 | java, java, libpng | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-65018) |
| CVE-2025-64720 | HIGH | 7.1 | java, java, libpng | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-64720) |
| CVE-2025-39883 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39883) |
| CVE-2025-39817 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare Observed on kernel 6.6...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39817) |
| CVE-2025-39760 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39760) |
| CVE-2025-39757 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39757) |
| CVE-2025-38556 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38556) |
| CVE-2025-38159 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38159) |
| CVE-2025-24528 | HIGH | 7.1 | krb5-libs | In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-24528) |
| CVE-2025-21905 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21905) |
| CVE-2024-53150 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53150) |
| CVE-2024-50301 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an out. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50301) |
| CVE-2024-42292 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42292) |
| CVE-2024-42094 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/iucv: Avoid explicit cpumask var allocation on stack For...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42094) |
| CVE-2024-41091 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41091) |
| CVE-2024-41090 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41090) |
| CVE-2024-41014 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xfs: add bounds checking to xlog_recover_process_data There is a lack of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41014) |
| CVE-2024-41013 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xfs: don't walk off the end of a directory data block This adds sanity checks for. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41013) |
| CVE-2024-40978 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix crash while reading debugfs attribute The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40978) |
| CVE-2024-40929 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids In some versions of.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40929) |
| CVE-2024-39499 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39499) |
| CVE-2024-39487 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() In function... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39487) |
| CVE-2024-39471 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add error handle to avoid out-of-bounds if the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39471) |
| CVE-2024-38538 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: bridge: xmit: make sure we have at least eth header len bytes syzbot...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38538) |
| CVE-2024-36960 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix invalid reads in fence signaled events Correctly set the length... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36960) |
| CVE-2024-36883 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: fix out-of-bounds access in ops_init net_alloc_generic is called by...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36883) |
| CVE-2024-35939 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: dma-direct: Leak pages on dma_set_decrypted() failure On TDX it is possible for... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35939) |
| CVE-2024-35937 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: check A-MSDU format more carefully If it looks like there's...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35937) |
| CVE-2024-35896 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: validate user input for expected length I got multiple syzbot reports.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35896) |
| CVE-2024-30205 | HIGH | 7.1 | emacs-filesystem | In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-30205) |
| CVE-2024-26982 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero Syskiller has... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26982) |
| CVE-2024-26669 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: flower: Fix chain template offload When a qdisc is deleted from a net.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26669) |
| CVE-2024-26665 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error If the ICMPv6...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26665) |
| CVE-2024-26664 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Fix out-of-bounds memory access Fix a bug that pdata->cpu_map[]. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26664) |
| CVE-2024-26593 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets,. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26593) |
| CVE-2023-52626 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52626) |
| CVE-2023-52598 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: s390/ptrace: handle setting of fpc register correctly If the content of the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52598) |
| CVE-2023-52565 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix OOB read If the index provided by the user is bigger than...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52565) |
| CVE-2023-48161 | HIGH | 7.1 | java, java | Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-48161) |
| CVE-2023-3758 | HIGH | 7.1 | libipa_hbac, libsss_autofs, libsss_certmap, libsss_idmap, libsss_nss_idmap, libsss_sudo, python3-sssdconfig, sssd, sssd-ad, sssd-client, sssd-common, sssd-common-pac, sssd-ipa, sssd-kcm, sssd-krb5, sssd-krb5-common, sssd-ldap, sssd-nfs-idmap, sssd-proxy | A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-3758) |
| CVE-2022-49985 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bpf: Don't use tnum_range on array range checking for poke descriptors Hsin-Wei... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49985) |
| CVE-2022-49395 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: um: Fix out-of-bounds read in LDT setup syscall_stub_data() expects the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49395) |
| CVE-2022-48866 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts Syzbot reported an. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48866) |
| CVE-2022-48760 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix hang in usb_kill_urb by adding memory barriers The syzbot fuzzer... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48760) |
| CVE-2022-48757 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48757) |
| CVE-2021-47624 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change The refcount. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47624) |
| CVE-2021-47393 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47393) |
| CVE-2021-47383 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47383) |
| CVE-2021-47153 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset Now that the i2c-i801 driver.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47153) |
| CVE-2021-47101 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read() asix_read_cmd() may read less than...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47101) |
| CVE-2021-47097 | HIGH | 7.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Input: elantech - fix stack out of bound access in elantech_change_report_id()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47097) |
| CVE-2025-38051 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition in.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38051) |
| CVE-2024-6655 | HIGH | 7.0 | gtk-update-icon-cache | A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-6655) |
| CVE-2024-50275 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50275) |
| CVE-2024-50154 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). Martin KaFai Lau...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50154) |
| CVE-2024-46858 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: Fix uaf in __timer_delete_sync There are two paths to access...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-46858) |
| CVE-2024-42228 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42228) |
| CVE-2024-41040 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix UAF when resolving a clash KASAN reports the following UAF: BUG:... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41040) |
| CVE-2024-39503 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39503) |
| CVE-2024-27397 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27397) |
| CVE-2024-27020 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27020) |
| CVE-2024-26976 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: KVM: Always flush async #PF workqueue when vCPU is being destroyed Always flush... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26976) |
| CVE-2024-26974 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: crypto: qat - resolve race condition during AER recovery During the PCI AER...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26974) |
| CVE-2024-26939 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/i915/vma: Fix UAF on destroy against retire race Object debugging tools were.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26939) |
| CVE-2024-26872 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26872) |
| CVE-2023-52847 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: bttv: fix use after free error due to btv->timeout timer There may be some. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52847) |
| CVE-2023-52578 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: bridge: use DEV_STATS_INC() syzbot/KCSAN reported data-races in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52578) |
| CVE-2021-47069 | HIGH | 7.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47069) |
| CVE-2020-11023 | MEDIUM | 6.9 | libgcc, libgomp, libstdc++ | In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-11023) |
| CVE-2026-22801 | MEDIUM | 6.8 | libpng | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-22801) |
| CVE-2025-26465 | MEDIUM | 6.8 | openssh, openssh-clients, openssh-server | A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-26465) |
| CVE-2024-5742 | MEDIUM | 6.7 | nano | A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-5742) |
| CVE-2024-40897 | MEDIUM | 6.7 | orc | Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40897) |
| CVE-2024-26586 | MEDIUM | 6.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix stack corruption When tc filters are first added to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26586) |
| CVE-2026-25749 | MEDIUM | 6.6 | vim-minimal | Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-25749) |
| CVE-2026-21968 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.44,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21968) |
| CVE-2025-65082 | MEDIUM | 6.5 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-65082) |
| CVE-2025-6395 | MEDIUM | 6.5 | gnutls | A NULL pointer dereference flaw was found in the GnuTLS software in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-6395) |
| CVE-2025-58364 | MEDIUM | 6.5 | cups-client, cups-libs | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-58364) |
| CVE-2025-50083 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50083) |
| CVE-2025-50082 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50082) |
| CVE-2025-50078 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50078) |
| CVE-2025-32990 | MEDIUM | 6.5 | gnutls | A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-32990) |
| CVE-2025-32988 | MEDIUM | 6.5 | gnutls | A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-32988) |
| CVE-2025-30688 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30688) |
| CVE-2025-30687 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30687) |
| CVE-2025-30682 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30682) |
| CVE-2025-21577 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21577) |
| CVE-2025-21575 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21575) |
| CVE-2025-21574 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21574) |
| CVE-2025-21522 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.40 and prior,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21522) |
| CVE-2025-21518 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21518) |
| CVE-2025-21501 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21501) |
| CVE-2025-21500 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21500) |
| CVE-2025-12801 | MEDIUM | 6.5 | libnfsidmap | A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-12801) |
| CVE-2024-7264 | MEDIUM | 6.5 | mysql-common, mysql-libs | libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-7264) |
| CVE-2024-39279 | MEDIUM | 6.5 | unknown | Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39279) |
| CVE-2024-36293 | MEDIUM | 6.5 | unknown | Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36293) |
| CVE-2024-21230 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21230) |
| CVE-2024-21196 | MEDIUM | 6.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior,... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21196) |
| CVE-2024-12088 | MEDIUM | 6.5 | rsync | A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12088) |
| CVE-2024-12087 | MEDIUM | 6.5 | rsync | A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12087) |
| CVE-2023-6240 | MEDIUM | 6.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-6240) |
| CVE-2023-40403 | MEDIUM | 6.5 | libxslt | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-40403) |
| CVE-2023-28746 | MEDIUM | 6.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-28746) |
| CVE-2024-35853 | MEDIUM | 6.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash The rehash delayed work... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35853) |
| CVE-2024-41012 | MEDIUM | 6.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: filelock: Remove locks reliably when fcntl/close race is detected When...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41012) |
| CVE-2025-0395 | MEDIUM | 6.2 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-0395) |
| CVE-2024-0450 | MEDIUM | 6.2 | platform-python, python3-libs | An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-0450) |
| CVE-2026-22695 | MEDIUM | 6.1 | libpng | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-22695) |
| CVE-2026-21933 | MEDIUM | 6.1 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21933) |
| CVE-2025-14104 | MEDIUM | 6.1 | libblkid, libfdisk, libmount, libsmartcols, libuuid, util-linux, util-linux-user | A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-14104) |
| CVE-2024-35899 | MEDIUM | 6.1 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: flush pending destroy work before exit_net release Similar.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35899) |
| CVE-2025-61915 | MEDIUM | 6.0 | cups-client, cups-libs | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-61915) |
| CVE-2024-26894 | MEDIUM | 6.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26894) |
| CVE-2024-26843 | MEDIUM | 6.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: efi: runtime: Fix potential overflow of soft-reserved region size md_size will...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26843) |
| CVE-2023-5090 | MEDIUM | 6.0 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-5090) |
| CVE-2023-31346 | MEDIUM | 6.0 | iwl100-firmware, iwl1000-firmware, iwl105-firmware, iwl135-firmware, iwl2000-firmware, iwl2030-firmware, iwl3160-firmware, iwl5000-firmware, iwl5150-firmware, iwl6000-firmware, iwl6000g2a-firmware, iwl6050-firmware, iwl7260-firmware, linux-firmware | Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-31346) |
| CVE-2025-53057 | MEDIUM | 5.9 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53057) |
| CVE-2025-40909 | MEDIUM | 5.9 | perl, perl-Attribute-Handlers, perl-Devel-Peek, perl-Devel-SelfStubber, perl-Errno, perl-ExtUtils-Embed, perl-ExtUtils-Miniperl, perl-IO, perl-IO-Zlib, perl-Locale-Maketext-Simple, perl-Math-Complex, perl-Memoize, perl-Module-Loaded, perl-Net-Ping, perl-Pod-Html, perl-SelfLoader, perl-Test, perl-Time-Piece, perl-devel, perl-interpreter, perl-libnetcfg, perl-libs, perl-macros, perl-open, perl-utils | Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40909) |
| CVE-2025-3576 | MEDIUM | 5.9 | krb5-libs | A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-3576) |
| CVE-2025-30761 | MEDIUM | 5.9 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30761) |
| CVE-2024-50602 | MEDIUM | 5.9 | expat | An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50602) |
| CVE-2024-33600 | MEDIUM | 5.9 | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-33600) |
| CVE-2024-26924 | MEDIUM | 5.9 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26924) |
| CVE-2024-20926 | MEDIUM | 5.9 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-20926) |
| CVE-2024-20921 | MEDIUM | 5.9 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-20921) |
| CVE-2024-20919 | MEDIUM | 5.9 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-20919) |
| CVE-2024-35910 | MEDIUM | 5.8 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35910) |
| CVE-2026-33412 | MEDIUM | 5.6 | vim-minimal | Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-33412) |
| CVE-2025-32414 | MEDIUM | 5.6 | libxml2 | In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-32414) |
| CVE-2025-30698 | MEDIUM | 5.6 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30698) |
| CVE-2025-24495 | MEDIUM | 5.6 | microcode_ctl | Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-24495) |
| CVE-2025-20623 | MEDIUM | 5.6 | microcode_ctl | Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core™... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-20623) |
| CVE-2024-45332 | MEDIUM | 5.6 | microcode_ctl | Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-45332) |
| CVE-2024-43420 | MEDIUM | 5.6 | microcode_ctl | Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R)...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43420) |
| CVE-2024-35195 | MEDIUM | 5.6 | python3-requests | Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35195) |
| CVE-2024-28956 | MEDIUM | 5.6 | microcode_ctl | Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-28956) |
| CVE-2024-12747 | MEDIUM | 5.6 | rsync | A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12747) |
| CVE-2026-23097 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: migrate: correct lock ordering for hugetlb file folios Syzbot has found a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-23097) |
| CVE-2025-71085 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() There...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-71085) |
| CVE-2025-53054 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53054) |
| CVE-2025-53053 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.43,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53053) |
| CVE-2025-50085 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50085) |
| CVE-2025-40300 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40300) |
| CVE-2025-39933 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done verify data_offset, data_length and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39933) |
| CVE-2025-39718 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39718) |
| CVE-2025-38684 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: use old 'nbands' while purging unused classes Shuang reported...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38684) |
| CVE-2025-38498 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: do_change_type(): refuse to operate on unmounted/not ours mounts Ensure that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38498) |
| CVE-2025-38449 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/gem: Acquire references on GEM handles for framebuffers A GEM handle can be... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38449) |
| CVE-2025-38392 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: idpf: convert control queue mutex to a spinlock With VIRTCHNL2_CAP_MACFILTER...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38392) |
| CVE-2025-38332 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38332) |
| CVE-2025-38200 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i40e: fix MMIO write access to an invalid page in i40e_clear_hw When the device... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38200) |
| CVE-2025-38086 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: ch9200: fix uninitialised access during mii_nway_restart In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38086) |
| CVE-2025-38053 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: idpf: fix null-ptr-deref in idpf_features_check idpf_features_check is used to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38053) |
| CVE-2025-30695 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30695) |
| CVE-2025-30693 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30693) |
| CVE-2025-23150 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: fix off-by-one error in do_split Syzkaller detected a use-after-free issue.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-23150) |
| CVE-2025-22116 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: idpf: check error for register_netdev() on init Current init logic ignores the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22116) |
| CVE-2025-22058 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: udp: Fix memory accounting leak. Matt Dowling reported a weird UDP memory usage... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22058) |
| CVE-2025-22045 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs On the following.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22045) |
| CVE-2025-22026 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-22026) |
| CVE-2025-21559 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21559) |
| CVE-2025-21555 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21555) |
| CVE-2025-21497 | MEDIUM | 5.5 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21497) |
| CVE-2024-6923 | MEDIUM | 5.5 | platform-python, python3-libs | There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-6923) |
| CVE-2024-57807 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-57807) |
| CVE-2024-56644 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-56644) |
| CVE-2024-53241 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53241) |
| CVE-2024-53122 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53122) |
| CVE-2024-53064 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: idpf: fix idpf_vc_core_init error path In an event where the platform running the. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53064) |
| CVE-2024-52337 | MEDIUM | 5.5 | tuned | A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-52337) |
| CVE-2024-50612 | MEDIUM | 5.5 | libsndfile | libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50612) |
| CVE-2024-50302 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50302) |
| CVE-2024-50256 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzbot. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50256) |
| CVE-2024-50142 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xfrm: validate new SA's prefixlen using SA family when sel.family is unset This... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50142) |
| CVE-2024-50110 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xfrm: fix one more kernel-infoleak in algo dumping During fuzz testing, the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50110) |
| CVE-2024-50099 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: arm64: probes: Remove broken LDR (literal) uprobe support The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50099) |
| CVE-2024-49949 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO After commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-49949) |
| CVE-2024-46826 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-46826) |
| CVE-2024-45018 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: initialise extack before use Fix missing initialisation of.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-45018) |
| CVE-2024-44990 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-44990) |
| CVE-2024-44989 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference We shouldn't set real_dev to.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-44989) |
| CVE-2024-44970 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink When all the strides in a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-44970) |
| CVE-2024-44935 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sctp: Fix null-ptr-deref in reuseport_add_sock(). syzbot reported a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-44935) |
| CVE-2024-43889 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: padata: Fix possible divide-by-0 panic in padata_mt_helper() We are hit with a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43889) |
| CVE-2024-43880 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_erp: Fix object nesting warning ACLs in Spectrum-2 and newer.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43880) |
| CVE-2024-43871 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43871) |
| CVE-2024-43854 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: block: initialize integrity buffer to zero before writing it to media Metadata...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43854) |
| CVE-2024-42322 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipvs: properly dereference pe in ip_vs_add_service Use pe directly to resolve...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42322) |
| CVE-2024-42265 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions both callers have.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42265) |
| CVE-2024-42246 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42246) |
| CVE-2024-42244 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: serial: mos7840: fix crash on resume Since commit c49cfa917025 ("USB:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42244) |
| CVE-2024-42240 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/bhi: Avoid warning in #DB handler due to BHI mitigation When BHI mitigation... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42240) |
| CVE-2024-42238 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Return error if block header overflows file Return an error...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42238) |
| CVE-2024-42237 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Validate payload length before processing block Move the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42237) |
| CVE-2024-42124 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Make qedf_execute_tmf() non-preemptible Stop calling...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42124) |
| CVE-2024-42096 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc() The 'profile_pc()' function is used. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42096) |
| CVE-2024-42090 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42090) |
| CVE-2024-42084 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ftruncate: pass a signed offset The old ftruncate() syscall, using the 32-bit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42084) |
| CVE-2024-42079 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42079) |
| CVE-2024-42070 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42070) |
| CVE-2024-41097 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix endpoint checking in cxacru_bind() Syzbot is still...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41097) |
| CVE-2024-41093 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid using null object of framebuffer Instead of using...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41093) |
| CVE-2024-41076 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix memory leak in nfs4_set_security_label We leak nfs_fattr and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41076) |
| CVE-2024-41066 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Add tx check to prevent skb leak Below is a summary of how the driver...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41066) |
| CVE-2024-41065 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Whitelist dtl slub object for copying to userspace Reading the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41065) |
| CVE-2024-41064 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/eeh: avoid possible crash when edev->pdev changes If a PCI device is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41064) |
| CVE-2024-41060 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check bo_va->bo is non-NULL before using it The call to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41060) |
| CVE-2024-41056 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files Use strnlen()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41056) |
| CVE-2024-41055 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41055) |
| CVE-2024-41044 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ppp: reject claimed-as-LCP but actually malformed packets Since...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41044) |
| CVE-2024-41041 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port(). syzkaller triggered the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41041) |
| CVE-2024-41038 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers Check...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41038) |
| CVE-2024-41035 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41035) |
| CVE-2024-41023 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sched/deadline: Fix task_struct reference leak During the execution of the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41023) |
| CVE-2024-41009 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41009) |
| CVE-2024-41008 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: change vm->task_info handling This patch changes the handling and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41008) |
| CVE-2024-40998 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40998) |
| CVE-2024-40997 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: fix memory leak on CPU EPP exit The cpudata memory from...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40997) |
| CVE-2024-40995 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() syzbot...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40995) |
| CVE-2024-40988 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix UBSAN warning in kv_dpm.c Adds bounds check for...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40988) |
| CVE-2024-40984 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.".. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40984) |
| CVE-2024-40983 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: force a dst refcount before doing decryption As it says in commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40983) |
| CVE-2024-40977 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery During chip...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40977) |
| CVE-2024-40972 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: do not create EA inode under buffer lock ext4_xattr_set_entry() creates new. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40972) |
| CVE-2024-40961 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40961) |
| CVE-2024-40960 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40960) |
| CVE-2024-40959 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() ip6_dst_idev() can.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40959) |
| CVE-2024-40941 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40941) |
| CVE-2024-40931 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_una is properly initialized on connect This is strictly related. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40931) |
| CVE-2024-40924 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/i915/dpt: Make DPT object unshrinkable In some scenarios, the DPT object gets. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40924) |
| CVE-2024-40912 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40912) |
| CVE-2024-40911 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Lock wiphy in cfg80211_get_station Wiphy should be locked before.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40911) |
| CVE-2024-40904 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages The syzbot... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-40904) |
| CVE-2024-39506 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39506) |
| CVE-2024-39476 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix deadlock that raid5d() wait for itself to clear...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39476) |
| CVE-2024-39472 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xfs: fix log recovery buffer allocation for the legacy h_size fixup Commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39472) |
| CVE-2024-39276 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() Syzbot.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39276) |
| CVE-2024-38619 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Check whether the media is initialized The member...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38619) |
| CVE-2024-38615 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cpufreq: exit() callback is optional The exit() callback is optional and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38615) |
| CVE-2024-38608 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix netif state handling mlx5e_suspend cleans resources only if...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38608) |
| CVE-2024-38598 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size Is is reported. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38598) |
| CVE-2024-38579 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38579) |
| CVE-2024-38575 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: pcie: handle randbuf allocation failure The kzalloc() in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38575) |
| CVE-2024-38564 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38564) |
| CVE-2024-38558 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix overwriting ct original tuple for ICMPv6...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38558) |
| CVE-2024-37356 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). In dctcp_update_alpha(), we. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-37356) |
| CVE-2024-36954 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append __skb_linearize() doesn't free...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36954) |
| CVE-2024-36953 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36953) |
| CVE-2024-36945 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/smc: fix neighbour and rtable leak in smc_ib_find_route() In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36945) |
| CVE-2024-36941 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: don't free NULL coalescing rule If the parsing fails, we can...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36941) |
| CVE-2024-36939 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nfs: Handle error of rpc_proc_register() in nfs_net_init(). syzkaller reported a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36939) |
| CVE-2024-36933 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nsh: Restore skb->{protocol,data,mac_header} for outer header in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36933) |
| CVE-2024-36929 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs SKB_GSO_FRAGLIST skbs... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36929) |
| CVE-2024-36924 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36924) |
| CVE-2024-36922 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: read txq->read_ptr under lock If we read txq->read_ptr without...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36922) |
| CVE-2024-36920 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING When the "storcli2 show".. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36920) |
| CVE-2024-36919 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36919) |
| CVE-2024-36917 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: block: fix overflow in blk_ioctl_discard() There is no check for overflow of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36917) |
| CVE-2024-36905 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets TCP_SYN_RECV state is. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36905) |
| CVE-2024-36902 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36902) |
| CVE-2024-36901 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36901) |
| CVE-2024-36889 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure snd_nxt is properly initialized on connect Christoph reported a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36889) |
| CVE-2024-36489 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tls: fix missing memory barrier in tls_init In tls_init(), a write memory barrier. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36489) |
| CVE-2024-36286 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36286) |
| CVE-2024-36270 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports:. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36270) |
| CVE-2024-36025 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() The app_reply->elem[]...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36025) |
| CVE-2024-36020 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i40e: fix vf may be used uninitialized in this function warning To fix the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36020) |
| CVE-2024-36017 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36017) |
| CVE-2024-36010 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: igb: Fix string truncation warnings in igb_set_fw_version Commit 1978d3ead82c...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36010) |
| CVE-2024-36007 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix warning during rehash As previously explained, the.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36007) |
| CVE-2024-36006 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage Both the function that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36006) |
| CVE-2024-36005 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: honor table dormant flag from netdev release event path...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36005) |
| CVE-2024-36004 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue Issue reported by customer...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36004) |
| CVE-2024-36000 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix missing hugetlb_lock for resv uncharge There is a recent report... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36000) |
| CVE-2024-35989 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms During the removal. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35989) |
| CVE-2024-35962 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35962) |
| CVE-2024-35959 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix mlx5e_priv_init() cleanup flow When mlx5e_priv_init() fails, the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35959) |
| CVE-2024-35958 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior ENA has two types of TX queues:.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35958) |
| CVE-2024-35952 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/ast: Fix soft lockup There is a while-loop in ast_dp_set_on_off() that could.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35952) |
| CVE-2024-35947 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: dyndbg: fix old BUG_ON in >control parser Fix a BUG_ON from 2009. Even if it...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35947) |
| CVE-2024-35946 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix null pointer access when abort scan During cancel scan we might.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35946) |
| CVE-2024-35944 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35944) |
| CVE-2024-35938 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: decrease MHI channel buffer length to 8KB Currently buf_len field... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35938) |
| CVE-2024-35930 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() The call to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35930) |
| CVE-2024-35925 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: block: prevent division by zero in blk_rq_stat_sum() The expression...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35925) |
| CVE-2024-35924 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Limit read size on v1.2 Between UCSI 1.2 and UCSI 2.0, the size. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35924) |
| CVE-2024-35912 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: rfi: fix potential response leaks If the rx payload length...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35912) |
| CVE-2024-35900 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject new basechain after table flag update When dormant... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35900) |
| CVE-2024-35898 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35898) |
| CVE-2024-35897 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: discard table flag update with pending basechain deletion... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35897) |
| CVE-2024-35893 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbmod: prevent kernel-infoleak syzbot found that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35893) |
| CVE-2024-35890 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: gro: fix ownership transfer If packets are GROed with fraglist they might be...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35890) |
| CVE-2024-35888 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb->head syzbot reported a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35888) |
| CVE-2024-35884 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: udp: do not accept non-tunnel GSO skbs landing in a tunnel When...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35884) |
| CVE-2024-35877 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: fix VM_PAT handling in COW mappings PAT handling won't do the right... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35877) |
| CVE-2024-35852 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work The rehash... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35852) |
| CVE-2024-35839 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: bridge: replace physindev with physinif in nf_bridge_info An skb can... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35839) |
| CVE-2024-35838 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak When a station is allocated, links...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35838) |
| CVE-2024-35824 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35824) |
| CVE-2024-35810 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35810) |
| CVE-2024-35807 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize We observed a corruption during...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35807) |
| CVE-2024-35801 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD Commit 672365477ae8 ("x86/fpu:.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35801) |
| CVE-2024-35790 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35790) |
| CVE-2024-33621 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound Raw packet from...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-33621) |
| CVE-2024-31076 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline The absence. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-31076) |
| CVE-2024-30203 | MEDIUM | 5.5 | emacs-filesystem | In Emacs before 29.3, Gnus treats inline MIME contents as...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-30203) |
| CVE-2024-27434 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't set the MFP flag for the GTK The firmware doesn't need.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27434) |
| CVE-2024-27410 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: reject iftype change with mesh ID change It's currently possible... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27410) |
| CVE-2024-27399 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout There is a race...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27399) |
| CVE-2024-27388 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix some memleaks in gssx_dec_option_array The creds and oa->data need to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27388) |
| CVE-2024-27062 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nouveau: lock the client object tree. It appears the client object tree has no...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27062) |
| CVE-2024-27059 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command The isd200...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27059) |
| CVE-2024-27056 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27056) |
| CVE-2024-27048 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: brcm80211: handle pmk_op allocation failure The kzalloc() in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27048) |
| CVE-2024-27025 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nbd: null check for nla_nest_start nla_nest_start() may fail and return NULL....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27025) |
| CVE-2024-27017 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generation.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27017) |
| CVE-2024-27014 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS When disabling aRFS under the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27014) |
| CVE-2024-27013 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev vhost_worker...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27013) |
| CVE-2024-27011 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memleak in map from abort path The delete set command... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27011) |
| CVE-2024-27010 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix mirred deadlock on device recursion When the mirred action is used. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27010) |
| CVE-2024-26993 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fs: sysfs: Fix reference leak in sysfs_break_active_protection() The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26993) |
| CVE-2024-26984 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nouveau: fix instmem race condition around ptr stores Running a lot of VK CTS in.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26984) |
| CVE-2024-26973 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale().. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26973) |
| CVE-2024-26964 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Add error handling in xhci_map_urb_for_dma Currently...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26964) |
| CVE-2024-26960 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26960) |
| CVE-2024-26940 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed The driver... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26940) |
| CVE-2024-26935 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix unremoved procfs host directory regression Commit fc663711b944...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26935) |
| CVE-2024-26931 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix command flush on cable pull System crash due to command failed. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26931) |
| CVE-2024-26925 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26925) |
| CVE-2024-26921 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26921) |
| CVE-2024-26919 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: ulpi: Fix debugfs directory leak The ULPI per-device debugfs root is named... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26919) |
| CVE-2024-26906 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() When trying to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26906) |
| CVE-2024-26901 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak syzbot identified a. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26901) |
| CVE-2024-26880 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend There is this reported crash when.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26880) |
| CVE-2024-26870 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 A call to listxattr(). | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26870) |
| CVE-2024-26855 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26855) |
| CVE-2024-26853 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: igc: avoid returning frame twice in XDP_REDIRECT When a frame can not be...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26853) |
| CVE-2024-26851 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: Add protection for bmp length out of range UBSAN...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26851) |
| CVE-2024-26840 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix memory leak in cachefiles_add_cache() The following memory leak... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26840) |
| CVE-2024-26826 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: fix data re-injection from stale subflow When the MPTCP PM detects that a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26826) |
| CVE-2024-26802 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: stmmac: Clear variable when destroying workqueue Currently when suspending driver. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26802) |
| CVE-2024-26801 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26801) |
| CVE-2024-26779 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26779) |
| CVE-2024-26773 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26773) |
| CVE-2024-26772 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26772) |
| CVE-2024-26766 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26766) |
| CVE-2024-26759 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix race when skipping swapcache When skipping swapcache for...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26759) |
| CVE-2024-26744 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter Make loading...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26744) |
| CVE-2024-26743 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/qedr: Fix qedr_create_user_qp error flow Avoid the following warning by...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26743) |
| CVE-2024-26740 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: use the backlog for mirred ingress The test Davide added... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26740) |
| CVE-2024-26735 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26735) |
| CVE-2024-26733 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26733) |
| CVE-2024-26717 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid-of: fix NULL-deref on failed power up A while back the I2C HID...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26717) |
| CVE-2024-26693 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix a crash when we run out of stations A DoS tool that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26693) |
| CVE-2024-26686 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26686) |
| CVE-2024-26675 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ppp_async: limit MRU to 64K syzbot triggered a warning [1] in __alloc_pages():...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26675) |
| CVE-2024-26660 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Implement bounds check for stream encoder creation in DCN301...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26660) |
| CVE-2024-26659 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xhci: handle isoc Babble and Buffer Overrun events properly xHCI 4.9 explicitly... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26659) |
| CVE-2024-26656 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix use-after-free bug The bug can be triggered by sending a single... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26656) |
| CVE-2024-26649 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the null pointer when load rlc firmware If the RLC firmware is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26649) |
| CVE-2024-26645 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map Running the. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26645) |
| CVE-2024-26643 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26643) |
| CVE-2024-26642 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26642) |
| CVE-2024-26640 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: add sanity checks to rx zerocopy TCP rx zerocopy intent is to map pages...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26640) |
| CVE-2024-26615 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/smc: fix illegal rmb_desc access in SMC-D connection dump A crash was found... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26615) |
| CVE-2024-26614 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: make sure init the accept_queue's spinlocks once When I run syz's...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26614) |
| CVE-2024-26603 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Stop relying on userspace for info to fault in xsave buffer Before this.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26603) |
| CVE-2024-26600 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP If the external phy.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26600) |
| CVE-2024-26595 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path When calling. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26595) |
| CVE-2024-26584 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26584) |
| CVE-2024-25739 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-25739) |
| CVE-2024-23848 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-23848) |
| CVE-2023-53597 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: fix mid leak during reconnection after timeout threshold When the number of. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53597) |
| CVE-2023-53539 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state save in rxe_requester If a send packet is dropped.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53539) |
| CVE-2023-53513 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nbd: fix incomplete validation of ioctl arg We tested and found an alarm caused... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53513) |
| CVE-2023-53297 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53297) |
| CVE-2023-53230 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix warning in cifs_smb3_do_mount() This fixes the following warning. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53230) |
| CVE-2023-53226 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix OOB and integer underflow when rx packets Make sure...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53226) |
| CVE-2023-53125 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53125) |
| CVE-2023-52881 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: do not accept ACK of bytes we never sent This patch is based on a detailed... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52881) |
| CVE-2023-52878 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52878) |
| CVE-2023-52877 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() It is possible... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52877) |
| CVE-2023-52845 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING syzbot...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52845) |
| CVE-2023-52834 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: atl1c: Work around the DMA RX overflow issue This is based on alx driver commit... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52834) |
| CVE-2023-52817 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52817) |
| CVE-2023-52813 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Fix hungtask for PADATA_RESET We found a hungtask bug in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52813) |
| CVE-2023-52811 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool In practice the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52811) |
| CVE-2023-52809 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52809) |
| CVE-2023-52803 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries RPC client pipefs...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52803) |
| CVE-2023-52791 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i2c: core: Run atomic i2c xfer when !preemptible Since bae1d3a05a8b, i2c...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52791) |
| CVE-2023-52784 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52784) |
| CVE-2023-52781 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52781) |
| CVE-2023-52762 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: virtio-blk: fix implicit overflow on virtio_max_dma_size The following codes have. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52762) |
| CVE-2023-52730 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mmc: sdio: fix possible resource leaks in some error paths If sdio_add_func() or.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52730) |
| CVE-2023-52703 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path syzbot reported...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52703) |
| CVE-2023-52700 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tipc: fix kernel warning when sending SYN message When sending a SYN message,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52700) |
| CVE-2023-52686 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check in opal_event_init() kasprintf()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52686) |
| CVE-2023-52683 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow In lpit_update_residency() there is. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52683) |
| CVE-2023-52675 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() kasprintf(). | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52675) |
| CVE-2023-52662 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node When ida_alloc_max fails,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52662) |
| CVE-2023-52658 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" This...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52658) |
| CVE-2023-52653 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix a memleak in gss_import_v2_context The ctx->mech_used.data allocated.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52653) |
| CVE-2023-52648 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Unmap the surface before resetting it on a plane state Switch to a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52648) |
| CVE-2023-52623 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix a suspicious RCU usage warning I received the following warning while. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52623) |
| CVE-2023-52622 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg When we online...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52622) |
| CVE-2023-52619 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Fix crash when setting number of cpus to an odd number When the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52619) |
| CVE-2023-52615 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwrng: core - Fix page fault dead lock on mmap-ed hwrng There is a dead-lock in... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52615) |
| CVE-2023-52610 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ct: fix skb leak and crash on ooo frags act_ct adds skb->users...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52610) |
| CVE-2023-52607 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add kasprintf() returns. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52607) |
| CVE-2023-52606 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/lib: Validate size for vector operations Some of the fp/vmx code in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52606) |
| CVE-2023-52595 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52595) |
| CVE-2023-52560 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() When.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52560) |
| CVE-2023-52528 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg syzbot...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52528) |
| CVE-2023-52522 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: fix possible store tearing in neigh_periodic_work() While looking at a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52522) |
| CVE-2023-52520 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix reference leak If a duplicate attribute is found...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52520) |
| CVE-2023-52513 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix connection failure handling In case immediate MPA request...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52513) |
| CVE-2023-52486 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm: Don't unref the same fb many times by mistake due to deadlock handling If we. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52486) |
| CVE-2023-52477 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb: hub: Guard against accesses to uninitialized BOS descriptors Many functions.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52477) |
| CVE-2023-52476 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: perf/x86/lbr: Filter vsyscall addresses We found that a panic can occur when a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52476) |
| CVE-2023-52471 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ice: Fix some null pointer dereference issues in ice_ptp.c devm_kasprintf()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52471) |
| CVE-2023-52470 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() check...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52470) |
| CVE-2023-52463 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: efivarfs: force RO when remounting if SetVariable is not supported If SetVariable. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52463) |
| CVE-2023-25433 | MEDIUM | 5.5 | libtiff | libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-25433) |
| CVE-2022-50372 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix memory leak when build ntlmssp negotiate blob failed There is a memory.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50372) |
| CVE-2022-50369 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix null-ptr-deref in vkms_release() A null-ptr-deref is triggered when. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50369) |
| CVE-2022-50341 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: fix oops during encryption When running xfstests against Azure the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50341) |
| CVE-2022-50269 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix memory leak in vkms_init() A memory leak was reported after the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50269) |
| CVE-2022-50228 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 Don't BUG/WARN... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50228) |
| CVE-2022-50020 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50020) |
| CVE-2022-49977 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49977) |
| CVE-2022-49788 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() `struct...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49788) |
| CVE-2022-49316 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFSv4: Don't hold the layoutget locks across multiple RPC calls When doing...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49316) |
| CVE-2022-49226 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: asix: add proper error handling of usb read errors Syzbot once again hit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49226) |
| CVE-2022-49057 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: block: null_blk: end timed out poll request When poll request is timed out, it is. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49057) |
| CVE-2022-49011 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-49011) |
| CVE-2022-48836 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Input: aiptek - properly check endpoint type Syzbot reported warning in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48836) |
| CVE-2022-48804 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vt_ioctl: fix array_index_nospec in vt_setactivate array_index_nospec ensures...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48804) |
| CVE-2022-48773 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create If there are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48773) |
| CVE-2022-48743 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: amd-xgbe: Fix skb data length underflow There will be BUG_ON() triggered in.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48743) |
| CVE-2022-48669 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Fix potential memleak in papr_get_attr() `buf` is allocated in... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48669) |
| CVE-2022-48627 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vt: fix memory overlapping when deleting chars in the buffer A memory overlapping. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48627) |
| CVE-2022-48619 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48619) |
| CVE-2021-47582 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: USB: core: Make do_proc_control() and do_proc_bulk() killable The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47582) |
| CVE-2021-47579 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real() Syzbot triggered the following warning in... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47579) |
| CVE-2021-47560 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum: Protect driver from buggy firmware When processing port up/down.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47560) |
| CVE-2021-47527 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: serial: core: fix transmit-buffer reset and memleak Commit 761ed4a94582 ("tty:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47527) |
| CVE-2021-47495 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usbnet: sanity check for maxpacket maxpacket of 0 makes no sense and oopses as we. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47495) |
| CVE-2021-47491 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm: khugepaged: skip huge page collapse for special files The read-only THP for... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47491) |
| CVE-2021-47468 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: isdn: mISDN: Fix sleeping function called from invalid context The driver can...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47468) |
| CVE-2021-47466 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm, slub: fix potential memoryleak in kmem_cache_open() In error path, the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47466) |
| CVE-2021-47455 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register() I got memory leak as...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47455) |
| CVE-2021-47432 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Don't overflow in peek() When we started spreading new.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47432) |
| CVE-2021-47412 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: block: don't call rq_qos_ops->done_bio if the bio isn't tracked rq_qos framework.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47412) |
| CVE-2021-47408 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: serialize hash resizes and cleanups Syzbot was able to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47408) |
| CVE-2021-47385 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47385) |
| CVE-2021-47373 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Fix potential VPE leak on error In its_vpe_irq_domain_alloc,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47373) |
| CVE-2021-47353 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: udf: Fix NULL pointer dereference in udf_symlink function In function...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47353) |
| CVE-2021-47304 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized This commit fixes a. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47304) |
| CVE-2021-47289 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ACPI: fix NULL pointer dereference Commit 71f642833284 ("ACPI: utils: Fix...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47289) |
| CVE-2021-47287 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: driver core: auxiliary bus: Fix memory leak when driver_register() fail If...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47287) |
| CVE-2021-47257 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: fix null deref in parse dev addr Fix a logic error that could...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47257) |
| CVE-2021-47236 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: cdc_eem: fix tx fixup skb leak when usbnet transmit a skb, eem fixup it in... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47236) |
| CVE-2021-47171 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: usb: fix memory leak in smsc75xx_bind Syzbot reported memory leak in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47171) |
| CVE-2021-47073 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47073) |
| CVE-2021-47055 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mtd: require write permissions for locking and badblock ioctls MEMLOCK, MEMUNLOCK. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47055) |
| CVE-2021-47018 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: powerpc/64: Fix the definition of the fixmap area At the time being, the fixmap... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47018) |
| CVE-2021-46972 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ovl: fix leaked dentry Since commit 6815f479ca90 ("ovl: use only uppermetacopy...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-46972) |
| CVE-2021-46939 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tracing: Restructure trace_clock_global() to never block It was reported that a... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-46939) |
| CVE-2021-46909 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ARM: footbridge: fix PCI interrupt mapping Since commit 30fdfb929e82 ("PCI: Add a. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-46909) |
| CVE-2020-36777 | MEDIUM | 5.5 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: Fix memory leak in dvb_media_device_free() dvb_media_device_free(). | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-36777) |
| CVE-2025-66200 | MEDIUM | 5.4 | httpd, httpd-filesystem, httpd-tools, mod_http2, mod_ssl | mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-66200) |
| CVE-2025-21540 | MEDIUM | 5.4 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21540) |
| CVE-2020-26555 | MEDIUM | 5.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2020-26555) |
| CVE-2026-28421 | MEDIUM | 5.3 | vim-minimal | Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-28421) |
| CVE-2025-8176 | MEDIUM | 5.3 | libtiff | A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-8176) |
| CVE-2025-30722 | MEDIUM | 5.3 | mysql-common, mysql-libs | Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30722) |
| CVE-2025-14831 | MEDIUM | 5.3 | gnutls | A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-14831) |
| CVE-2025-12084 | MEDIUM | 5.3 | platform-python, python3-libs | When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-12084) |
| CVE-2025-11083 | MEDIUM | 5.3 | binutils | A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-11083) |
| CVE-2024-8508 | MEDIUM | 5.3 | python3-unbound, unbound-libs | NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-8508) |
| CVE-2024-47081 | MEDIUM | 5.3 | python3-requests | Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47081) |
| CVE-2024-35835 | MEDIUM | 5.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix a double-free in arfs_create_groups When `in` allocated by...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35835) |
| CVE-2024-35823 | MEDIUM | 5.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vt: fix unicode buffer corruption when deleting characters This is the same issue. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35823) |
| CVE-2024-31157 | MEDIUM | 5.3 | unknown | Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-31157) |
| CVE-2024-31068 | MEDIUM | 5.3 | unknown | Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-31068) |
| CVE-2024-28182 | MEDIUM | 5.3 | libnghttp2 | nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-28182) |
| CVE-2024-28047 | MEDIUM | 5.3 | unknown | Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-28047) |
| CVE-2024-26804 | MEDIUM | 5.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26804) |
| CVE-2024-26458 | MEDIUM | 5.3 | krb5-libs | Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26458) |
| CVE-2024-21238 | MEDIUM | 5.3 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21238) |
| CVE-2024-12718 | MEDIUM | 5.3 | platform-python, python3-libs | Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12718) |
| CVE-2024-12243 | MEDIUM | 5.3 | gnutls | A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12243) |
| CVE-2024-12133 | MEDIUM | 5.3 | libtasn1 | A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-12133) |
| CVE-2023-22081 | MEDIUM | 5.3 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-22081) |
| CVE-2023-22067 | MEDIUM | 5.3 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: CORBA). Supported versions that are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-22067) |
| CVE-2023-20584 | MEDIUM | 5.3 | iwl100-firmware, iwl1000-firmware, iwl105-firmware, iwl135-firmware, iwl2000-firmware, iwl2030-firmware, iwl3160-firmware, iwl5000-firmware, iwl5150-firmware, iwl6000-firmware, iwl6000g2a-firmware, iwl6050-firmware, iwl7260-firmware, linux-firmware | IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-20584) |
| CVE-2021-47384 | MEDIUM | 5.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47384) |
| CVE-2024-34397 | MEDIUM | 5.2 | glib2 | An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-34397) |
| CVE-2025-58436 | MEDIUM | 5.1 | cups-client, cups-libs | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-58436) |
| CVE-2025-5372 | MEDIUM | 5.0 | libssh, libssh-config | A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-5372) |
| CVE-2026-21964 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.44,. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21964) |
| CVE-2026-21948 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.44,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21948) |
| CVE-2026-21941 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.44,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21941) |
| CVE-2026-21937 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.44,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21937) |
| CVE-2026-21936 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21936) |
| CVE-2025-53069 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53069) |
| CVE-2025-53062 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53062) |
| CVE-2025-53045 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53045) |
| CVE-2025-53044 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53044) |
| CVE-2025-53042 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53042) |
| CVE-2025-53040 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53040) |
| CVE-2025-53023 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.42....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53023) |
| CVE-2025-50102 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50102) |
| CVE-2025-50101 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50101) |
| CVE-2025-50099 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50099) |
| CVE-2025-50097 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50097) |
| CVE-2025-50094 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.42, 8.4.5 and 9.3.0.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50094) |
| CVE-2025-50093 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50093) |
| CVE-2025-50092 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50092) |
| CVE-2025-50091 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50091) |
| CVE-2025-50088 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50088) |
| CVE-2025-50087 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50087) |
| CVE-2025-50086 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50086) |
| CVE-2025-50084 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50084) |
| CVE-2025-50080 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50080) |
| CVE-2025-50079 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50079) |
| CVE-2025-50077 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50077) |
| CVE-2025-30715 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30715) |
| CVE-2025-30705 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30705) |
| CVE-2025-30699 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30699) |
| CVE-2025-30696 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30696) |
| CVE-2025-30689 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30689) |
| CVE-2025-30685 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30685) |
| CVE-2025-30684 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30684) |
| CVE-2025-30683 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30683) |
| CVE-2025-21585 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21585) |
| CVE-2025-21584 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21584) |
| CVE-2025-21581 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21581) |
| CVE-2025-21580 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21580) |
| CVE-2025-21579 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21579) |
| CVE-2025-21543 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 8.0.40 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21543) |
| CVE-2025-21536 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21536) |
| CVE-2025-21534 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema). Supported versions that are affected are 8.0.39...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21534) |
| CVE-2025-21531 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21531) |
| CVE-2025-21529 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.40...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21529) |
| CVE-2025-21525 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21525) |
| CVE-2025-21523 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21523) |
| CVE-2025-21505 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.40... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21505) |
| CVE-2025-21504 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21504) |
| CVE-2025-21503 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21503) |
| CVE-2025-21491 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21491) |
| CVE-2025-21490 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21490) |
| CVE-2025-20012 | MEDIUM | 4.9 | microcode_ctl | Incorrect behavior order for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable information disclosure...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-20012) |
| CVE-2024-21241 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21241) |
| CVE-2024-21239 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21239) |
| CVE-2024-21236 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21236) |
| CVE-2024-21219 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21219) |
| CVE-2024-21218 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21218) |
| CVE-2024-21203 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21203) |
| CVE-2024-21201 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21201) |
| CVE-2024-21199 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21199) |
| CVE-2024-21198 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21198) |
| CVE-2024-21197 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21197) |
| CVE-2024-21194 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21194) |
| CVE-2024-21193 | MEDIUM | 4.9 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21193) |
| CVE-2026-21925 | MEDIUM | 4.8 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-21925) |
| CVE-2025-4373 | MEDIUM | 4.8 | glib2 | A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-4373) |
| CVE-2025-30754 | MEDIUM | 4.8 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30754) |
| CVE-2025-30691 | MEDIUM | 4.8 | java, java | Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK:... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30691) |
| CVE-2024-21235 | MEDIUM | 4.8 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21235) |
| CVE-2024-21145 | MEDIUM | 4.8 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21145) |
| CVE-2024-21140 | MEDIUM | 4.8 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21140) |
| CVE-2025-39825 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39825) |
| CVE-2025-39697 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a race when updating an existing write After...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39697) |
| CVE-2025-38477 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38477) |
| CVE-2025-38461 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload.... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38461) |
| CVE-2025-38393 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN We found a few different...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38393) |
| CVE-2025-38234 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sched/rt: Fix race in push_rt_task Overview ======== When a CPU chooses to call... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38234) |
| CVE-2025-38085 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race huge_pmd_unshare() drops a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38085) |
| CVE-2024-53088 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i40e: fix race condition by adding filter's intermediate sync state Fix a race...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-53088) |
| CVE-2024-50192 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE Kunkun Jiang reported that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50192) |
| CVE-2024-50082 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race We're seeing... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-50082) |
| CVE-2024-47668 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() If we need to... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-47668) |
| CVE-2024-46679 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings A sysfs reader can...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-46679) |
| CVE-2024-43892 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr Commit 73f576c04b94 ("mm:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-43892) |
| CVE-2024-42152 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nvmet: fix a possible leak when destroy a ctrl during qp establishment In...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42152) |
| CVE-2024-41005 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netpoll: Fix race condition in netpoll_owner_active KCSAN detected a race...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41005) |
| CVE-2024-38596 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg A data-race...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38596) |
| CVE-2024-36952 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up There. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36952) |
| CVE-2024-36927 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix uninit-value access in __ip_make_skb() KMSAN reported uninit-value...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36927) |
| CVE-2024-35809 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal A race condition...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35809) |
| CVE-2024-27019 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27019) |
| CVE-2024-26923 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26923) |
| CVE-2024-26897 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26897) |
| CVE-2024-26878 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference Below race may cause NULL pointer... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26878) |
| CVE-2024-26859 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net/bnx2x: Prevent access to a freed page in page_pool Fix race condition leading. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26859) |
| CVE-2024-26837 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26837) |
| CVE-2024-26698 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove In commit...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26698) |
| CVE-2024-26585 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26585) |
| CVE-2024-26583 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26583) |
| CVE-2024-2201 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-2201) |
| CVE-2024-20945 | MEDIUM | 4.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-20945) |
| CVE-2024-10041 | MEDIUM | 4.7 | pam, pam-devel | A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-10041) |
| CVE-2023-53401 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() KCSAN...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53401) |
| CVE-2023-53178 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm: fix zswap writeback race condition The zswap writeback mechanism can cause a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53178) |
| CVE-2023-52478 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52478) |
| CVE-2021-47461 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix a race between writeprotect and exit_mmap() A race is possible... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47461) |
| CVE-2021-47284 | MEDIUM | 4.7 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: isdn: mISDN: netjet: Fix crash in nj_probe: 'nj_setup' in netjet.c might fail...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47284) |
| CVE-2024-24857 | MEDIUM | 4.6 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-24857) |
| CVE-2026-28417 | MEDIUM | 4.4 | vim-minimal | Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-28417) |
| CVE-2025-50096 | MEDIUM | 4.4 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50096) |
| CVE-2025-30704 | MEDIUM | 4.4 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30704) |
| CVE-2025-21519 | MEDIUM | 4.4 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21519) |
| CVE-2024-46695 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-46695) |
| CVE-2024-42154 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42154) |
| CVE-2024-42131 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42131) |
| CVE-2024-42114 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values syzbot is able to...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42114) |
| CVE-2024-38559 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38559) |
| CVE-2024-38540 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq Undefined...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-38540) |
| CVE-2024-37891 | MEDIUM | 4.4 | python3-urllib3 |  urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-37891) |
| CVE-2024-36950 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: firewire: ohci: mask bus reset interrupts between ISR and bottom half In the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36950) |
| CVE-2024-36928 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: s390/qeth: Fix kernel panic after setting hsuid Symptom: When the hsuid attribute. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-36928) |
| CVE-2024-35235 | MEDIUM | 4.4 | cups-client, cups-libs | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35235) |
| CVE-2024-26846 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nvme-fc: do not wait in vain when unloading module The module exit path has race.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26846) |
| CVE-2024-26810 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26810) |
| CVE-2024-26769 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: avoid deadlock on delete association path When deleting an association.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26769) |
| CVE-2024-26638 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: nbd: always initialize struct msghdr completely syzbot complains that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26638) |
| CVE-2024-23307 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-23307) |
| CVE-2024-21212 | MEDIUM | 4.4 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21212) |
| CVE-2024-0340 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-0340) |
| CVE-2023-52800 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix htt pktlog locking The ath11k active pdevs are protected by RCU. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52800) |
| CVE-2023-52492 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: dmaengine: fix NULL pointer in channel unregistration function...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52492) |
| CVE-2023-31356 | MEDIUM | 4.4 | iwl100-firmware, iwl1000-firmware, iwl105-firmware, iwl135-firmware, iwl2000-firmware, iwl2030-firmware, iwl3160-firmware, iwl5000-firmware, iwl5150-firmware, iwl6000-firmware, iwl6000g2a-firmware, iwl6050-firmware, iwl7260-firmware, linux-firmware | Incomplete system memory cleanup in SEV firmware could allow a privileged attacker to corrupt guest private memory, potentially resulting in a loss... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-31356) |
| CVE-2021-47185 | MEDIUM | 4.4 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc When running ltp...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-47185) |
| CVE-2025-10158 | MEDIUM | 4.3 | rsync | A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-10158) |
| CVE-2024-21213 | MEDIUM | 4.2 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21213) |
| CVE-2025-53906 | MEDIUM | 4.1 | vim-minimal | Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53906) |
| CVE-2025-53905 | MEDIUM | 4.1 | vim-minimal | Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-53905) |
| CVE-2025-21494 | MEDIUM | 4.1 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.39.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21494) |
| CVE-2025-9820 | MEDIUM | 4.0 | gnutls | A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-9820) |
| CVE-2025-30721 | MEDIUM | 4.0 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30721) |
| CVE-2025-21546 | LOW | 3.8 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21546) |
| CVE-2024-21247 | LOW | 3.8 | mysql-common, mysql-libs | Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21247) |
| CVE-2024-21217 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization)... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21217) |
| CVE-2024-21210 | LOW | 3.7 | java, java | Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12,... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21210) |
| CVE-2024-21208 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21208) |
| CVE-2024-21144 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21144) |
| CVE-2024-21138 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21138) |
| CVE-2024-21131 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21131) |
| CVE-2024-21094 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21094) |
| CVE-2024-21085 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21085) |
| CVE-2024-21068 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21068) |
| CVE-2024-21011 | LOW | 3.7 | java, java | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot)....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21011) |
| CVE-2024-11168 | LOW | 3.7 | platform-python, python3-libs | The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-11168) |
| CVE-2025-61985 | LOW | 3.6 | openssh, openssh-clients, openssh-server | ssh in OpenSSH before 10.1 allows the '\\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-61985) |
| CVE-2025-61984 | LOW | 3.6 | openssh, openssh-clients, openssh-server | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-61984) |
| CVE-2024-11053 | LOW | 3.4 | mysql-common, mysql-libs | When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-11053) |
| CVE-2024-41007 | LOW | 3.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT,. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41007) |
| CVE-2023-6228 | LOW | 3.3 | libtiff | An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-6228) |
| CVE-2021-46934 | LOW | 3.3 | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i2c: validate user data in compat ioctl Wrong user data may cause warning in...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2021-46934) |
| CVE-2025-50081 | LOW | 3.1 | mysql-common, mysql-libs | Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50081) |
| CVE-2024-21231 | LOW | 3.1 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21231) |
| CVE-2025-32415 | LOW | 2.9 | libxml2 | In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-32415) |
| CVE-2025-32462 | LOW | 2.8 | sudo | Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-32462) |
| CVE-2025-50104 | LOW | 2.7 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50104) |
| CVE-2025-50098 | LOW | 2.7 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50098) |
| CVE-2025-30703 | LOW | 2.7 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30703) |
| CVE-2025-30681 | LOW | 2.7 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-30681) |
| CVE-2025-50100 | LOW | 2.2 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42,. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-50100) |
| CVE-2024-21237 | LOW | 2.2 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-21237) |
| CVE-2025-21520 | LOW | 1.8 | mysql-common, mysql-libs | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.40 and prior,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-21520) |
| CVE-2026-4519 | N/A | N/A | platform-python, python3-libs | The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-4519) |
| CVE-2026-3497 | N/A | N/A | openssh, openssh-clients, openssh-server | Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-3497) |
| CVE-2026-3085 | N/A | N/A | gstreamer1-plugins-bad-free, gstreamer1-plugins-base | GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-3085) |
| CVE-2026-3083 | N/A | N/A | gstreamer1-plugins-bad-free, gstreamer1-plugins-base | GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-3083) |
| CVE-2026-3082 | N/A | N/A | gstreamer1-plugins-bad-free, gstreamer1-plugins-base | GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-3082) |
| CVE-2026-2923 | N/A | N/A | gstreamer1-plugins-bad-free, gstreamer1-plugins-base | GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-2923) |
| CVE-2026-2921 | N/A | N/A | gstreamer1-plugins-bad-free, gstreamer1-plugins-base | GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-2921) |
| CVE-2026-2920 | N/A | N/A | gstreamer1-plugins-bad-free, gstreamer1-plugins-base | GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-2920) |
| CVE-2026-1299 | N/A | N/A | platform-python, python3-libs | The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-1299) |
| CVE-2026-0865 | N/A | N/A | platform-python, python3-libs | User-controlled header names and values containing newlines can allow injecting HTTP...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2026-0865) |
| CVE-2025-8058 | N/A | N/A | glibc, glibc-common, glibc-gconv-extra, glibc-langpack-en, libnsl, nscd | The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-8058) |
| CVE-2025-68800 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats Cited.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68800) |
| CVE-2025-68349 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid Fixes.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68349) |
| CVE-2025-68301 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: atlantic: fix fragment overflow handling in RX path The atlantic driver can.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68301) |
| CVE-2025-68285 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-68285) |
| CVE-2025-6176 | N/A | N/A | brotli | Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-6176) |
| CVE-2025-5994 | N/A | N/A | python3-unbound, unbound-libs | A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-5994) |
| CVE-2025-40322 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fbdev: bitblit: bound-check glyph index in bit_putcs*...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40322) |
| CVE-2025-40304 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds Add bounds... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40304) |
| CVE-2025-40277 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40277) |
| CVE-2025-40271 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40271) |
| CVE-2025-40269 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer The PCM stream...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40269) |
| CVE-2025-40258 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-free. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40258) |
| CVE-2025-40248 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40248) |
| CVE-2025-40240 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40240) |
| CVE-2025-40186 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40186) |
| CVE-2025-40170 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40170) |
| CVE-2025-40168 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40168) |
| CVE-2025-40158 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_output() Use RCU in ip6_output() in order to use...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40158) |
| CVE-2025-40154 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40154) |
| CVE-2025-40135 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_xmit() Use RCU in ip6_xmit() in order to use dst_dev_rcu()... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40135) |
| CVE-2025-40096 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40096) |
| CVE-2025-40064 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in __pnet_find_base_ndev(). syzbot reported...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-40064) |
| CVE-2025-39993 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: media: rc: fix races with imon_disconnect() Syzbot reports a KASAN issue as...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39993) |
| CVE-2025-39973 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39973) |
| CVE-2025-39971 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39971) |
| CVE-2025-39898 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39898) |
| CVE-2025-39751 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-39751) |
| CVE-2025-3887 | N/A | N/A | gstreamer1-plugins-bad-free | GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-3887) |
| CVE-2025-38380 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-38380) |
| CVE-2025-15367 | N/A | N/A | platform-python, python3-libs | The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-15367) |
| CVE-2025-15366 | N/A | N/A | platform-python, python3-libs | The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-15366) |
| CVE-2025-0938 | N/A | N/A | platform-python, python3-libs | The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2025-0938) |
| CVE-2024-6345 | N/A | N/A | platform-python-setuptools, python3-setuptools, python3-setuptools-wheel | A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions....  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-6345) |
| CVE-2024-42226 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-42226) |
| CVE-2024-41071 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-41071) |
| CVE-2024-39501 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-39501) |
| CVE-2024-35876 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-35876) |
| CVE-2024-27042 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-27042) |
| CVE-2024-26929 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26929) |
| CVE-2024-26908 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26908) |
| CVE-2024-26720 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2024-26720) |
| CVE-2023-54296 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration Fix a...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-54296) |
| CVE-2023-54269 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: double free xprt_ctxt while still in use When an RPC request is deferred,. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-54269) |
| CVE-2023-54170 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-54170) |
| CVE-2023-54114 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() As the...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-54114) |
| CVE-2023-53847 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: usb-storage: alauda: Fix uninit-value in alauda_check_media() Syzbot got KMSAN to. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53847) |
| CVE-2023-53762 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync Use-after-free can occur.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53762) |
| CVE-2023-53751 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-53751) |
| CVE-2023-52756 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52756) |
| CVE-2023-52605 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2023-52605) |
| CVE-2022-50865 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50865) |
| CVE-2022-50856 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix xid leak in cifs_ses_add_channel() Before return, should free the xid,.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50856) |
| CVE-2022-50673 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | In the Linux kernel, the following vulnerability has been resolved: ext4: fix use-after-free in ext4_orphan_cleanup I caught a issue as follows:...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50673) |
| CVE-2022-50495 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-50495) |
| CVE-2022-48936 | N/A | N/A | bpftool, kernel, kernel-core, kernel-modules, kernel-modules-extra, kernel-tools, kernel-tools-libs, python3-perf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-48936) |
| CVE-2022-40433 | N/A | N/A | java, java | Rejected reason: ** REJECT ** This CVE ID has been rejected by its CNA as it was not a security...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2022-40433) |
| CVE-2018-15209 | N/A | N/A | libtiff | ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and.. | [Details](https://nvd.nist.gov/vuln/detail/CVE-2018-15209) |
| CVE-2018-12699 | N/A | N/A | binutils | finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified... | [Details](https://nvd.nist.gov/vuln/detail/CVE-2018-12699) |
| CVE-2017-17095 | N/A | N/A | libtiff | tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2017-17095) |
| CVE-2013-0340 | N/A | N/A | expat | expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function,...  | [Details](https://nvd.nist.gov/vuln/detail/CVE-2013-0340) |

*Severity levels: Critical / High / Medium / Low — per CVSS v3 scoring.*

---

## 4. RPM Packages

| RPM Package | Version | CVEs Remediated |
|-------------|---------|-----------------|
| NetworkManager | 1.40.16-20.el8_10.x86_64 | CVE-2024-3661 |
| NetworkManager-libnm | 1.40.16-20.el8_10.x86_64 | CVE-2024-3661 |
| NetworkManager-team | 1.40.16-20.el8_10.x86_64 | CVE-2024-3661 |
| NetworkManager-tui | 1.40.16-20.el8_10.x86_64 | CVE-2024-3661 |
| PackageKit | 1.1.12-7.el8.x86_64 | — |
| PackageKit-glib | 1.1.12-7.el8.x86_64 | — |
| bind-libs | 9.11.36-16.el8_10.6.x86_64 | — |
| bind-libs-lite | 9.11.36-16.el8_10.6.x86_64 | — |
| bind-license | 9.11.36-16.el8_10.6.noarch | — |
| bind-utils | 9.11.36-16.el8_10.6.x86_64 | — |
| binutils | 2.30-128.el8_10.x86_64 | CVE-2018-12699,CVE-2025-11083 |
| bpftool | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| brotli | 1.0.6-4.el8_10.x86_64 | CVE-2025-6176 |
| bzip2 | 1.0.6-28.el8_10.x86_64 | CVE-2019-12900 |
| bzip2-libs | 1.0.6-28.el8_10.x86_64 | CVE-2019-12900 |
| cairo-gobject | 1.15.12-6.el8.x86_64 | — |
| cockpit | 310.6-1.el8_10.x86_64 | CVE-2024-2947 |
| cockpit-bridge | 310.6-1.el8_10.x86_64 | CVE-2024-2947 |
| cockpit-packagekit | 310.3-3.el8_10.noarch | — |
| cockpit-system | 310.6-1.el8_10.noarch | CVE-2024-2947 |
| cockpit-ws | 310.6-1.el8_10.x86_64 | CVE-2024-2947 |
| compat-openssl10 | 1.0.2o-4.el8_10.1.x86_64 | CVE-2023-0286 |
| cups-client | 2.2.6-67.el8_10.x86_64 | CVE-2024-35235,CVE-2024-47175,CVE-2025-58060,CVE-2025-58364,CVE-2025-58436,CVE-2025-61915 |
| cups-libs | 2.2.6-67.el8_10.x86_64 | CVE-2024-35235,CVE-2024-47175,CVE-2025-58060,CVE-2025-58364,CVE-2025-58436,CVE-2025-61915 |
| curl | 7.61.1-34.el8_10.11.x86_64 | CVE-2024-2398,CVE-2025-9086 |
| emacs-filesystem | 26.1-15.el8_10.noarch | CVE-2024-30203,CVE-2024-30205,CVE-2024-39331,CVE-2024-53920,CVE-2025-1244 |
| expat | 2.5.0-1.el8_10.x86_64 | CVE-2013-0340,CVE-2022-23990,CVE-2024-28757,CVE-2024-45490,CVE-2024-45491,CVE-2024-45492,CVE-2024-50602,CVE-2024-8176,CVE-2025-59375 |
| freetype | 2.9.1-10.el8_10.x86_64 | CVE-2025-27363 |
| fstrm | 0.6.1-3.el8.x86_64 | — |
| gdk-pixbuf2 | 2.36.12-7.el8_10.x86_64 | CVE-2022-48622,CVE-2025-7345 |
| gdk-pixbuf2-modules | 2.36.12-7.el8_10.x86_64 | CVE-2022-48622,CVE-2025-7345 |
| glib2 | 2.56.4-168.el8_10.x86_64 | CVE-2024-34397,CVE-2024-52533,CVE-2025-13601,CVE-2025-4373 |
| glibc | 2.28-251.el8_10.31.x86_64 | CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602,CVE-2025-0395,CVE-2025-15281,CVE-2025-4802,CVE-2025-8058,CVE-2026-0915 |
| glibc-common | 2.28-251.el8_10.31.x86_64 | CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602,CVE-2025-0395,CVE-2025-15281,CVE-2025-4802,CVE-2025-8058,CVE-2026-0915 |
| glibc-gconv-extra | 2.28-251.el8_10.31.x86_64 | CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602,CVE-2025-0395,CVE-2025-15281,CVE-2025-4802,CVE-2025-8058,CVE-2026-0915 |
| glibc-langpack-en | 2.28-251.el8_10.31.x86_64 | CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602,CVE-2025-0395,CVE-2025-15281,CVE-2025-4802,CVE-2025-8058,CVE-2026-0915 |
| gnupg2 | 2.2.20-4.el8_10.x86_64 | CVE-2025-68973 |
| gnupg2-smime | 2.2.20-4.el8_10.x86_64 | CVE-2025-68973 |
| gnutls | 3.6.16-8.el8_10.5.x86_64 | CVE-2024-12243,CVE-2025-14831,CVE-2025-32988,CVE-2025-32990,CVE-2025-6395,CVE-2025-9820 |
| grub2-common | 2.02-170.el8_10.1.noarch | CVE-2025-0624,CVE-2025-61662 |
| grub2-pc | 2.02-170.el8_10.1.x86_64 | CVE-2025-0624,CVE-2025-61662 |
| grub2-pc-modules | 2.02-170.el8_10.1.noarch | CVE-2025-0624,CVE-2025-61662 |
| grub2-tools | 2.02-170.el8_10.1.x86_64 | CVE-2025-0624,CVE-2025-61662 |
| grub2-tools-efi | 2.02-170.el8_10.1.x86_64 | — |
| grub2-tools-extra | 2.02-170.el8_10.1.x86_64 | CVE-2025-0624,CVE-2025-61662 |
| grub2-tools-minimal | 2.02-170.el8_10.1.x86_64 | CVE-2025-0624,CVE-2025-61662 |
| gstreamer1-plugins-bad-free | 1.16.1-6.el8_10.x86_64 | CVE-2025-3887,CVE-2026-2920,CVE-2026-2921,CVE-2026-2923,CVE-2026-3082,CVE-2026-3083,CVE-2026-3085 |
| gstreamer1-plugins-base | 1.16.1-6.el8_10.x86_64 | CVE-2024-4453,CVE-2024-47538,CVE-2024-47607,CVE-2024-47615,CVE-2026-2920,CVE-2026-2921,CVE-2026-2923,CVE-2026-3082,CVE-2026-3083,CVE-2026-3085 |
| gtk-update-icon-cache | 3.22.30-12.el8_10.x86_64 | CVE-2024-6655 |
| httpd | 2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 | CVE-2023-38709,CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39573,CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-55753,CVE-2025-58098,CVE-2025-65082,CVE-2025-66200 |
| httpd-filesystem | 2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.noarch | CVE-2023-38709,CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39573,CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-55753,CVE-2025-58098,CVE-2025-65082,CVE-2025-66200 |
| httpd-tools | 2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 | CVE-2023-38709,CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39573,CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-55753,CVE-2025-58098,CVE-2025-65082,CVE-2025-66200 |
| iwl100-firmware | 39.31.5.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl1000-firmware | 39.31.5.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl105-firmware | 18.168.6.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl135-firmware | 18.168.6.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl2000-firmware | 18.168.6.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl2030-firmware | 18.168.6.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl3160-firmware | 25.30.13.0-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl5000-firmware | 8.83.5.1_1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl5150-firmware | 8.24.2.2-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl6000-firmware | 9.221.4.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl6000g2a-firmware | 18.168.6.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl6050-firmware | 41.28.5.1-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| iwl7260-firmware | 25.30.13.0-135.el8_10.1.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| java-1.8.0-openjdk | 1.8.0.482.b08-1.el8.x86_64 | — |
| java-1.8.0-openjdk-headless | 1.8.0.482.b08-1.el8.x86_64 | — |
| kernel | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| kernel-core | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| kernel-modules | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| kernel-modules-extra | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| kernel-tools | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| kernel-tools-libs | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| krb5-libs | 1.18.2-32.el8_10.x86_64 | CVE-2024-26458,CVE-2024-26461,CVE-2024-3596,CVE-2024-37370,CVE-2024-37371,CVE-2025-24528,CVE-2025-3576 |
| less | 530-3.el8_10.x86_64 | CVE-2022-48624,CVE-2024-32487 |
| libappstream-glib | 0.7.14-3.el8.x86_64 | — |
| libarchive | 3.3.3-6.el8_10.x86_64 | CVE-2025-5914 |
| libblkid | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| libcurl | 7.61.1-34.el8_10.11.x86_64 | CVE-2024-2398,CVE-2025-9086 |
| libfdisk | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| libgcc | 8.5.0-28.el8_10.x86_64 | CVE-2020-11023 |
| libgomp | 8.5.0-28.el8_10.x86_64 | CVE-2020-11023 |
| libipa_hbac | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| libjpeg-turbo | 1.5.3-14.el8_10.x86_64 | CVE-2020-13790 |
| libmount | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| libndp | 1.7-7.el8_10.x86_64 | CVE-2024-5564 |
| libnfsidmap | 2.3.3-68.el8_10.x86_64 | CVE-2025-12801 |
| libnghttp2 | 1.33.0-6.el8_10.1.x86_64 | CVE-2024-28182 |
| libnsl | 2.28-251.el8_10.31.x86_64 | CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602,CVE-2025-0395,CVE-2025-15281,CVE-2025-4802,CVE-2025-8058,CVE-2026-0915 |
| libpng | 1.6.34-10.el8_10.x86_64 | CVE-2025-64720,CVE-2025-65018,CVE-2025-66293,CVE-2026-22695,CVE-2026-22801,CVE-2026-25646 |
| libsmartcols | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| libsmbclient | 4.19.4-15.el8_10.x86_64 | — |
| libsndfile | 1.0.28-16.el8_10.x86_64 | CVE-2024-50612 |
| libsoup | 2.62.3-13.el8_10.x86_64 | — |
| libssh | 0.9.6-16.el8_10.x86_64 | CVE-2025-5318,CVE-2025-5372 |
| libssh-config | 0.9.6-16.el8_10.noarch | CVE-2025-5318,CVE-2025-5372 |
| libsss_autofs | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| libsss_certmap | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| libsss_idmap | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| libsss_nss_idmap | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| libsss_sudo | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| libstdc++ | 8.5.0-28.el8_10.x86_64 | CVE-2020-11023 |
| libstemmer | 0-10.585svn.el8.x86_64 | — |
| libtasn1 | 4.13-5.el8_10.x86_64 | CVE-2024-12133 |
| libtiff | 4.0.9-36.el8_10.x86_64 | CVE-2017-17095,CVE-2018-15209,CVE-2023-25433,CVE-2023-52356,CVE-2023-6228,CVE-2024-7006,CVE-2025-8176,CVE-2025-9900 |
| libuuid | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| libwbclient | 4.19.4-15.el8_10.x86_64 | — |
| libxml2 | 2.9.7-21.el8_10.3.x86_64 | CVE-2022-49043,CVE-2024-25062,CVE-2024-56171,CVE-2025-24928,CVE-2025-32414,CVE-2025-32415,CVE-2025-49794,CVE-2025-49796,CVE-2025-6021,CVE-2025-7425 |
| libxslt | 1.1.32-6.3.el8_10.x86_64 | CVE-2023-40403,CVE-2024-55549,CVE-2025-24855 |
| linux-firmware | 20260112-135.git486ac8f9.el8_10.noarch | CVE-2023-20584,CVE-2023-31315,CVE-2023-31346,CVE-2023-31356 |
| lz4-libs | 1.8.3-5.el8_10.x86_64 | CVE-2019-17543 |
| microcode_ctl | 20251111-1.el8_10.x86_64 | CVE-2024-28956,CVE-2024-43420,CVE-2024-45332,CVE-2025-20012,CVE-2025-20623,CVE-2025-24495 |
| mod_http2 | 1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64 | CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-55753,CVE-2025-58098,CVE-2025-65082,CVE-2025-66200 |
| mod_ssl | 2.4.37-65.module+el8.10.0+23815+1b5e1c66.7.x86_64 | CVE-2023-38709,CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39573,CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-55753,CVE-2025-58098,CVE-2025-65082,CVE-2025-66200 |
| nano | 2.9.8-3.el8_10.x86_64 | CVE-2024-5742 |
| net-snmp | 5.8-33.el8_10.x86_64 | CVE-2025-68615 |
| net-snmp-agent-libs | 5.8-33.el8_10.x86_64 | CVE-2025-68615 |
| net-snmp-libs | 5.8-33.el8_10.x86_64 | CVE-2025-68615 |
| net-snmp-perl | 5.8-33.el8_10.x86_64 | CVE-2025-68615 |
| net-snmp-utils | 5.8-33.el8_10.x86_64 | CVE-2025-68615 |
| nscd | 2.28-251.el8_10.31.x86_64 | CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602,CVE-2025-0395,CVE-2025-15281,CVE-2025-4802,CVE-2025-8058,CVE-2026-0915 |
| openldap | 2.4.46-21.el8_10.x86_64 | CVE-2023-2953 |
| openssh | 8.0p1-28.el8_10.x86_64 | CVE-2025-26465,CVE-2025-61984,CVE-2025-61985,CVE-2026-3497 |
| openssh-clients | 8.0p1-28.el8_10.x86_64 | CVE-2025-26465,CVE-2025-61984,CVE-2025-61985,CVE-2026-3497 |
| openssh-server | 8.0p1-28.el8_10.x86_64 | CVE-2025-26465,CVE-2025-61984,CVE-2025-61985,CVE-2026-3497 |
| openssl | 1.1.1k-15.el8_6.x86_64 | CVE-2023-0286,CVE-2024-5535,CVE-2025-69419,CVE-2025-9230 |
| openssl-libs | 1.1.1k-15.el8_6.x86_64 | CVE-2024-5535,CVE-2025-69419,CVE-2025-9230 |
| orc | 0.4.28-4.el8_10.x86_64 | CVE-2024-40897 |
| pam | 1.3.1-39.el8_10.x86_64 | CVE-2024-10041,CVE-2024-10963,CVE-2025-6020,CVE-2025-8941 |
| pam-devel | 1.3.1-39.el8_10.x86_64 | CVE-2024-10041,CVE-2024-10963,CVE-2025-6020,CVE-2025-8941 |
| perl | 5.26.3-423.el8_10.x86_64 | CVE-2020-16156,CVE-2025-40909,CVE-2025-68615 |
| perl-Attribute-Handlers | 0.99-423.el8_10.noarch | CVE-2025-40909 |
| perl-CPAN | 2.18-402.el8_10.noarch | CVE-2020-16156 |
| perl-Devel-Peek | 1.26-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-Devel-SelfStubber | 1.06-423.el8_10.noarch | CVE-2025-40909 |
| perl-Errno | 1.28-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-ExtUtils-Embed | 1.34-423.el8_10.noarch | CVE-2025-40909 |
| perl-ExtUtils-Miniperl | 1.06-423.el8_10.noarch | CVE-2025-40909 |
| perl-IO | 1.38-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-IO-Zlib | 1.10-423.el8_10.noarch | CVE-2025-40909 |
| perl-Locale-Maketext-Simple | 0.21-423.el8_10.noarch | CVE-2025-40909 |
| perl-Math-Complex | 1.59-423.el8_10.noarch | CVE-2025-40909 |
| perl-Memoize | 1.03-423.el8_10.noarch | CVE-2025-40909 |
| perl-Module-Loaded | 0.08-423.el8_10.noarch | CVE-2025-40909 |
| perl-Net-Ping | 2.55-423.el8_10.noarch | CVE-2025-40909 |
| perl-Pod-Html | 1.22.02-423.el8_10.noarch | CVE-2025-40909 |
| perl-SelfLoader | 1.23-423.el8_10.noarch | CVE-2025-40909 |
| perl-Test | 1.30-423.el8_10.noarch | CVE-2025-40909 |
| perl-Time-Piece | 1.31-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-devel | 5.26.3-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-interpreter | 5.26.3-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-libnetcfg | 5.26.3-423.el8_10.noarch | CVE-2025-40909 |
| perl-libs | 5.26.3-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-macros | 5.26.3-423.el8_10.x86_64 | CVE-2025-40909 |
| perl-open | 1.11-423.el8_10.noarch | CVE-2025-40909 |
| perl-utils | 5.26.3-423.el8_10.noarch | CVE-2025-40909 |
| platform-python | 3.6.8-75.el8_10.x86_64 | CVE-2023-6597,CVE-2024-0450,CVE-2024-11168,CVE-2024-12718,CVE-2024-4032,CVE-2024-6232,CVE-2024-6345,CVE-2024-6923,CVE-2024-9287,CVE-2025-0938,CVE-2025-12084,CVE-2025-15366,CVE-2025-15367,CVE-2025-4138,CVE-2025-4330,CVE-2025-4435,CVE-2025-4517,CVE-2025-47273,CVE-2025-8194,CVE-2026-0865,CVE-2026-1299,CVE-2026-4519 |
| platform-python-setuptools | 39.2.0-9.el8_10.noarch | CVE-2024-6345,CVE-2025-47273 |
| protobuf-c | 1.3.0-8.el8.x86_64 | — |
| python3-bind | 9.11.36-16.el8_10.6.noarch | — |
| python3-cairo | 1.16.3-6.el8.x86_64 | — |
| python3-distro | 1.4.0-2.module+el8.10.0+20784+edafcd43.noarch | — |
| python3-gobject | 3.28.3-2.el8.x86_64 | — |
| python3-idna | 2.5-7.el8_10.noarch | CVE-2024-3651 |
| python3-libs | 3.6.8-75.el8_10.x86_64 | CVE-2023-6597,CVE-2024-0450,CVE-2024-11168,CVE-2024-12718,CVE-2024-4032,CVE-2024-6232,CVE-2024-6923,CVE-2024-9287,CVE-2025-0938,CVE-2025-12084,CVE-2025-15366,CVE-2025-15367,CVE-2025-4138,CVE-2025-4330,CVE-2025-4435,CVE-2025-4517,CVE-2025-8194,CVE-2026-0865,CVE-2026-1299,CVE-2026-4519 |
| python3-libxml2 | 2.9.7-21.el8_10.3.x86_64 | — |
| python3-perf | 4.18.0-553.117.1.el8_10.x86_64 | CVE-2019-25162,CVE-2020-26555,CVE-2020-36777,CVE-2021-46909,CVE-2021-46934,CVE-2021-46939,CVE-2021-46972,CVE-2021-46984,CVE-2021-47013,CVE-2021-47018,CVE-2021-47055,CVE-2021-47069,CVE-2021-47073,CVE-2021-47097,CVE-2021-47101,CVE-2021-47118,CVE-2021-47153,CVE-2021-47171,CVE-2021-47185,CVE-2021-47236,CVE-2021-47257,CVE-2021-47284,CVE-2021-47287,CVE-2021-47289,CVE-2021-47304,CVE-2021-47310,CVE-2021-47311,CVE-2021-47321,CVE-2021-47338,CVE-2021-47352,CVE-2021-47353,CVE-2021-47356,CVE-2021-47373,CVE-2021-47383,CVE-2021-47384,CVE-2021-47385,CVE-2021-47386,CVE-2021-47393,CVE-2021-47408,CVE-2021-47412,CVE-2021-47432,CVE-2021-47441,CVE-2021-47455,CVE-2021-47456,CVE-2021-47461,CVE-2021-47466,CVE-2021-47468,CVE-2021-47491,CVE-2021-47495,CVE-2021-47497,CVE-2021-47527,CVE-2021-47548,CVE-2021-47560,CVE-2021-47579,CVE-2021-47582,CVE-2021-47609,CVE-2021-47624,CVE-2021-47670,CVE-2022-48619,CVE-2022-48627,CVE-2022-48632,CVE-2022-48669,CVE-2022-48743,CVE-2022-48747,CVE-2022-48754,CVE-2022-48757,CVE-2022-48760,CVE-2022-48773,CVE-2022-48804,CVE-2022-48836,CVE-2022-48866,CVE-2022-48919,CVE-2022-48936,CVE-2022-49011,CVE-2022-49057,CVE-2022-49058,CVE-2022-49111,CVE-2022-49136,CVE-2022-49226,CVE-2022-49316,CVE-2022-49395,CVE-2022-49788,CVE-2022-49846,CVE-2022-49977,CVE-2022-49985,CVE-2022-50020,CVE-2022-50072,CVE-2022-50087,CVE-2022-50228,CVE-2022-50269,CVE-2022-50341,CVE-2022-50367,CVE-2022-50369,CVE-2022-50372,CVE-2022-50386,CVE-2022-50495,CVE-2022-50543,CVE-2022-50673,CVE-2022-50856,CVE-2022-50865,CVE-2023-28746,CVE-2023-5090,CVE-2023-52439,CVE-2023-52445,CVE-2023-52451,CVE-2023-52463,CVE-2023-52464,CVE-2023-52469,CVE-2023-52470,CVE-2023-52471,CVE-2023-52476,CVE-2023-52477,CVE-2023-52478,CVE-2023-52486,CVE-2023-52492,CVE-2023-52513,CVE-2023-52520,CVE-2023-52522,CVE-2023-52528,CVE-2023-52530,CVE-2023-52560,CVE-2023-52565,CVE-2023-52578,CVE-2023-52594,CVE-2023-52595,CVE-2023-52598,CVE-2023-52605,CVE-2023-52606,CVE-2023-52607,CVE-2023-52610,CVE-2023-52615,CVE-2023-52619,CVE-2023-52622,CVE-2023-52623,CVE-2023-52626,CVE-2023-52648,CVE-2023-52653,CVE-2023-52658,CVE-2023-52662,CVE-2023-52667,CVE-2023-52669,CVE-2023-52675,CVE-2023-52679,CVE-2023-52683,CVE-2023-52686,CVE-2023-52700,CVE-2023-52703,CVE-2023-52707,CVE-2023-52730,CVE-2023-52756,CVE-2023-52762,CVE-2023-52764,CVE-2023-52775,CVE-2023-52777,CVE-2023-52781,CVE-2023-52784,CVE-2023-52791,CVE-2023-52796,CVE-2023-52798,CVE-2023-52800,CVE-2023-52803,CVE-2023-52809,CVE-2023-52811,CVE-2023-52813,CVE-2023-52817,CVE-2023-52832,CVE-2023-52834,CVE-2023-52835,CVE-2023-52840,CVE-2023-52845,CVE-2023-52847,CVE-2023-52864,CVE-2023-52877,CVE-2023-52878,CVE-2023-52881,CVE-2023-52922,CVE-2023-53125,CVE-2023-53178,CVE-2023-53226,CVE-2023-53230,CVE-2023-53257,CVE-2023-53297,CVE-2023-53305,CVE-2023-53373,CVE-2023-53386,CVE-2023-53401,CVE-2023-53513,CVE-2023-53539,CVE-2023-53552,CVE-2023-53597,CVE-2023-53621,CVE-2023-53673,CVE-2023-53751,CVE-2023-53762,CVE-2023-53847,CVE-2023-54114,CVE-2023-54170,CVE-2023-54269,CVE-2023-54296,CVE-2023-6040,CVE-2023-6240,CVE-2024-0340,CVE-2024-21823,CVE-2024-2201,CVE-2024-23307,CVE-2024-23848,CVE-2024-24857,CVE-2024-25739,CVE-2024-25744,CVE-2024-26583,CVE-2024-26584,CVE-2024-26585,CVE-2024-26586,CVE-2024-26593,CVE-2024-26595,CVE-2024-26600,CVE-2024-26603,CVE-2024-26610,CVE-2024-26614,CVE-2024-26615,CVE-2024-26638,CVE-2024-26640,CVE-2024-26642,CVE-2024-26643,CVE-2024-26645,CVE-2024-26649,CVE-2024-26656,CVE-2024-26659,CVE-2024-26660,CVE-2024-26664,CVE-2024-26665,CVE-2024-26669,CVE-2024-26675,CVE-2024-26686,CVE-2024-26693,CVE-2024-26694,CVE-2024-26698,CVE-2024-26704,CVE-2024-26717,CVE-2024-26720,CVE-2024-26733,CVE-2024-26735,CVE-2024-26740,CVE-2024-26743,CVE-2024-26744,CVE-2024-26759,CVE-2024-26766,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26779,CVE-2024-26782,CVE-2024-26801,CVE-2024-26802,CVE-2024-26804,CVE-2024-26810,CVE-2024-26826,CVE-2024-26837,CVE-2024-26840,CVE-2024-26843,CVE-2024-26846,CVE-2024-26851,CVE-2024-26852,CVE-2024-26853,CVE-2024-26855,CVE-2024-26859,CVE-2024-26870,CVE-2024-26872,CVE-2024-26878,CVE-2024-26880,CVE-2024-26892,CVE-2024-26894,CVE-2024-26897,CVE-2024-26901,CVE-2024-26906,CVE-2024-26907,CVE-2024-26908,CVE-2024-26919,CVE-2024-26921,CVE-2024-26923,CVE-2024-26924,CVE-2024-26925,CVE-2024-26929,CVE-2024-26931,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26939,CVE-2024-26940,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26964,CVE-2024-26973,CVE-2024-26974,CVE-2024-26976,CVE-2024-26982,CVE-2024-26984,CVE-2024-26993,CVE-2024-27010,CVE-2024-27011,CVE-2024-27013,CVE-2024-27014,CVE-2024-27017,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27042,CVE-2024-27043,CVE-2024-27048,CVE-2024-27052,CVE-2024-27056,CVE-2024-27059,CVE-2024-27062,CVE-2024-27065,CVE-2024-27388,CVE-2024-27395,CVE-2024-27397,CVE-2024-27399,CVE-2024-27410,CVE-2024-27434,CVE-2024-31076,CVE-2024-33621,CVE-2024-35789,CVE-2024-35790,CVE-2024-35801,CVE-2024-35807,CVE-2024-35809,CVE-2024-35810,CVE-2024-35814,CVE-2024-35823,CVE-2024-35824,CVE-2024-35835,CVE-2024-35838,CVE-2024-35839,CVE-2024-35845,CVE-2024-35847,CVE-2024-35852,CVE-2024-35853,CVE-2024-35854,CVE-2024-35855,CVE-2024-35876,CVE-2024-35877,CVE-2024-35884,CVE-2024-35888,CVE-2024-35890,CVE-2024-35893,CVE-2024-35896,CVE-2024-35897,CVE-2024-35898,CVE-2024-35899,CVE-2024-35900,CVE-2024-35910,CVE-2024-35912,CVE-2024-35924,CVE-2024-35925,CVE-2024-35930,CVE-2024-35937,CVE-2024-35938,CVE-2024-35939,CVE-2024-35944,CVE-2024-35946,CVE-2024-35947,CVE-2024-35952,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35962,CVE-2024-35989,CVE-2024-36000,CVE-2024-36004,CVE-2024-36005,CVE-2024-36006,CVE-2024-36007,CVE-2024-36010,CVE-2024-36016,CVE-2024-36017,CVE-2024-36020,CVE-2024-36025,CVE-2024-36270,CVE-2024-36286,CVE-2024-36489,CVE-2024-36883,CVE-2024-36886,CVE-2024-36889,CVE-2024-36896,CVE-2024-36901,CVE-2024-36902,CVE-2024-36904,CVE-2024-36905,CVE-2024-36917,CVE-2024-36919,CVE-2024-36920,CVE-2024-36921,CVE-2024-36922,CVE-2024-36924,CVE-2024-36927,CVE-2024-36928,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36940,CVE-2024-36941,CVE-2024-36945,CVE-2024-36950,CVE-2024-36952,CVE-2024-36953,CVE-2024-36954,CVE-2024-36960,CVE-2024-36971,CVE-2024-36978,CVE-2024-36979,CVE-2024-37356,CVE-2024-38538,CVE-2024-38540,CVE-2024-38541,CVE-2024-38555,CVE-2024-38558,CVE-2024-38559,CVE-2024-38564,CVE-2024-38570,CVE-2024-38573,CVE-2024-38575,CVE-2024-38579,CVE-2024-38581,CVE-2024-38586,CVE-2024-38596,CVE-2024-38598,CVE-2024-38608,CVE-2024-38615,CVE-2024-38619,CVE-2024-38627,CVE-2024-39276,CVE-2024-39471,CVE-2024-39472,CVE-2024-39476,CVE-2024-39487,CVE-2024-39499,CVE-2024-39501,CVE-2024-39502,CVE-2024-39503,CVE-2024-39506,CVE-2024-40901,CVE-2024-40904,CVE-2024-40906,CVE-2024-40911,CVE-2024-40912,CVE-2024-40924,CVE-2024-40927,CVE-2024-40929,CVE-2024-40931,CVE-2024-40941,CVE-2024-40954,CVE-2024-40958,CVE-2024-40959,CVE-2024-40960,CVE-2024-40961,CVE-2024-40972,CVE-2024-40974,CVE-2024-40977,CVE-2024-40978,CVE-2024-40983,CVE-2024-40984,CVE-2024-40988,CVE-2024-40989,CVE-2024-40995,CVE-2024-40997,CVE-2024-40998,CVE-2024-41005,CVE-2024-41007,CVE-2024-41008,CVE-2024-41009,CVE-2024-41012,CVE-2024-41013,CVE-2024-41014,CVE-2024-41023,CVE-2024-41035,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41042,CVE-2024-41044,CVE-2024-41055,CVE-2024-41056,CVE-2024-41060,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41071,CVE-2024-41076,CVE-2024-41090,CVE-2024-41091,CVE-2024-41092,CVE-2024-41093,CVE-2024-41097,CVE-2024-42070,CVE-2024-42079,CVE-2024-42084,CVE-2024-42090,CVE-2024-42094,CVE-2024-42096,CVE-2024-42114,CVE-2024-42124,CVE-2024-42131,CVE-2024-42152,CVE-2024-42154,CVE-2024-42159,CVE-2024-42225,CVE-2024-42226,CVE-2024-42228,CVE-2024-42237,CVE-2024-42238,CVE-2024-42240,CVE-2024-42244,CVE-2024-42246,CVE-2024-42265,CVE-2024-42284,CVE-2024-42292,CVE-2024-42301,CVE-2024-42322,CVE-2024-43830,CVE-2024-43842,CVE-2024-43854,CVE-2024-43871,CVE-2024-43880,CVE-2024-43889,CVE-2024-43892,CVE-2024-44935,CVE-2024-44970,CVE-2024-44989,CVE-2024-44990,CVE-2024-45018,CVE-2024-45026,CVE-2024-46679,CVE-2024-46695,CVE-2024-46826,CVE-2024-46858,CVE-2024-47668,CVE-2024-49949,CVE-2024-50082,CVE-2024-50099,CVE-2024-50110,CVE-2024-50142,CVE-2024-50154,CVE-2024-50192,CVE-2024-50256,CVE-2024-50264,CVE-2024-50275,CVE-2024-50301,CVE-2024-50302,CVE-2024-53064,CVE-2024-53088,CVE-2024-53104,CVE-2024-53122,CVE-2024-53141,CVE-2024-53150,CVE-2024-53197,CVE-2024-53241,CVE-2024-56644,CVE-2024-57807,CVE-2024-57979,CVE-2024-57980,CVE-2024-58002,CVE-2025-21727,CVE-2025-21756,CVE-2025-21759,CVE-2025-21764,CVE-2025-21785,CVE-2025-21905,CVE-2025-21919,CVE-2025-21928,CVE-2025-21991,CVE-2025-22004,CVE-2025-22020,CVE-2025-22026,CVE-2025-22045,CVE-2025-22058,CVE-2025-22097,CVE-2025-22116,CVE-2025-23150,CVE-2025-37738,CVE-2025-37797,CVE-2025-37823,CVE-2025-37890,CVE-2025-37914,CVE-2025-38022,CVE-2025-38024,CVE-2025-38051,CVE-2025-38052,CVE-2025-38053,CVE-2025-38079,CVE-2025-38085,CVE-2025-38086,CVE-2025-38129,CVE-2025-38159,CVE-2025-38180,CVE-2025-38200,CVE-2025-38211,CVE-2025-38234,CVE-2025-38248,CVE-2025-38250,CVE-2025-38332,CVE-2025-38350,CVE-2025-38352,CVE-2025-38380,CVE-2025-38392,CVE-2025-38393,CVE-2025-38403,CVE-2025-38415,CVE-2025-38449,CVE-2025-38459,CVE-2025-38461,CVE-2025-38464,CVE-2025-38477,CVE-2025-38498,CVE-2025-38527,CVE-2025-38556,CVE-2025-38684,CVE-2025-38718,CVE-2025-38724,CVE-2025-39697,CVE-2025-39718,CVE-2025-39730,CVE-2025-39751,CVE-2025-39757,CVE-2025-39760,CVE-2025-39817,CVE-2025-39825,CVE-2025-39841,CVE-2025-39849,CVE-2025-39864,CVE-2025-39883,CVE-2025-39898,CVE-2025-39933,CVE-2025-39955,CVE-2025-39971,CVE-2025-39973,CVE-2025-39993,CVE-2025-40064,CVE-2025-40096,CVE-2025-40135,CVE-2025-40154,CVE-2025-40158,CVE-2025-40168,CVE-2025-40170,CVE-2025-40186,CVE-2025-40240,CVE-2025-40248,CVE-2025-40258,CVE-2025-40269,CVE-2025-40271,CVE-2025-40277,CVE-2025-40300,CVE-2025-40304,CVE-2025-40322,CVE-2025-68285,CVE-2025-68301,CVE-2025-68349,CVE-2025-68800,CVE-2025-71085,CVE-2025-71238,CVE-2026-22998,CVE-2026-23001,CVE-2026-23074,CVE-2026-23097,CVE-2026-23193,CVE-2026-23204,CVE-2026-23209,CVE-2026-23231 |
| python3-ply | 3.9-9.el8.noarch | — |
| python3-psutil | 5.4.3-11.el8.x86_64 | — |
| python3-pydbus | 0.6.0-5.el8.noarch | — |
| python3-requests | 2.20.0-6.el8_10.noarch | CVE-2024-35195,CVE-2024-47081 |
| python3-setuptools | 39.2.0-9.el8_10.noarch | CVE-2024-6345,CVE-2025-47273 |
| python3-setuptools-wheel | 39.2.0-9.el8_10.noarch | CVE-2024-6345,CVE-2025-47273 |
| python3-sssdconfig | 2.9.4-5.el8_10.4.noarch | CVE-2023-3758,CVE-2025-11561 |
| python3-tracer | 1.1-1.el8.noarch | — |
| python3-unbound | 1.16.2-5.9.el8_10.x86_64 | CVE-2024-1488,CVE-2024-8508,CVE-2025-5994 |
| python3-urllib3 | 1.24.2-9.el8_10.noarch | CVE-2024-37891,CVE-2025-66418,CVE-2025-66471,CVE-2026-21441 |
| qt5-qtbase | 5.15.3-8.el8_10.x86_64 | CVE-2024-39936 |
| qt5-qtbase-common | 5.15.3-8.el8_10.noarch | CVE-2024-39936 |
| qt5-qtbase-gui | 5.15.3-8.el8_10.x86_64 | CVE-2024-39936 |
| rhc | 0.2.5-4.el8_10.x86_64 | CVE-2022-3064,CVE-2025-61726,CVE-2025-61729,CVE-2025-68121 |
| rsync | 3.1.3-24.el8_10.x86_64 | CVE-2016-9840,CVE-2024-12085,CVE-2024-12087,CVE-2024-12088,CVE-2024-12747,CVE-2025-10158 |
| samba-client-libs | 4.19.4-15.el8_10.x86_64 | — |
| samba-common | 4.19.4-15.el8_10.noarch | — |
| samba-common-libs | 4.19.4-15.el8_10.x86_64 | — |
| setroubleshoot-plugins | 3.3.14-1.el8.noarch | — |
| setroubleshoot-server | 3.3.26-6.el8.x86_64 | — |
| sqlite | 3.26.0-20.el8_10.x86_64 | CVE-2025-6965 |
| sqlite-libs | 3.26.0-20.el8_10.x86_64 | CVE-2025-6965 |
| sssd | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-ad | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-client | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-common | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-common-pac | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-ipa | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-kcm | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-krb5 | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-krb5-common | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-ldap | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-nfs-idmap | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sssd-proxy | 2.9.4-5.el8_10.4.x86_64 | CVE-2023-3758,CVE-2025-11561 |
| sudo | 1.9.5p2-1.el8_10.3.x86_64 | CVE-2023-3758,CVE-2025-11561,CVE-2025-32462 |
| tracer-common | 1.1-1.el8.noarch | — |
| tuned | 2.22.1-6.el8_10.noarch | CVE-2024-52337 |
| tzdata-java | 2026a-1.el8.noarch | — |
| unbound-libs | 1.16.2-5.9.el8_10.x86_64 | CVE-2024-1488,CVE-2024-8508,CVE-2025-5994 |
| util-linux | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| util-linux-user | 2.32.1-48.el8_10.x86_64 | CVE-2025-14104 |
| vim-minimal | 8.0.1763-22.el8_10.1.x86_64 | CVE-2025-53905,CVE-2025-53906,CVE-2026-25749,CVE-2026-28417,CVE-2026-28421,CVE-2026-33412 |
| wget | 1.19.5-12.el8_10.x86_64 | CVE-2024-38428 |

---

## 5. Known Issues

- None identified during the automated scan and packaging phase.

---

## 6. Conclusion

The 202604 OS update addresses 1044 CVE(s) across 210 RPM package(s). No application-layer changes are included. Apply during the next scheduled maintenance window.

---

## 7. Method of Procedure (MoP)

Apply this update during a scheduled maintenance window. Perform the following steps on each Lithium node.

> **Prerequisites**
> - Root or sudo access on the target server.
> - The OS update ISO file for cycle 202604 has been obtained from NewNet support.
> - A maintenance window is open; Lithium services may be restarted if the kernel is updated.

---

### Step 1 — Transfer and Mount the ISO

1. Copy the ISO to the target server (replace filename and path as appropriate):

   ```bash
   scp NMM-OS-24.03.24.06-RHEL8.10-x86_64.iso <user>@<server>:/tmp/
   ```

2. Create a mount point and mount the ISO:

   ```bash
   mkdir -p /mnt/lithium-os-update
   mount -o loop /tmp/NMM-OS-24.03.24.06-RHEL8.10-x86_64.iso /mnt/lithium-os-update
   ```

3. Verify the mount and confirm packages are visible:

   ```bash
   ls /mnt/lithium-os-update/Packages/
   ```

---

### Step 2 — Update the Local Yum Repository

Edit `/etc/yum.repos.d/lithium-OS_local.repo` and set the `baseurl` to the mounted ISO path:

```ini
[lithium-OS_local]
name=Lithium OS Local Update - 202604
baseurl=file:///mnt/lithium-os-update
enabled=1
gpgcheck=0
```

> **Note:** If the repo file does not exist, create it with the content above. If it already points to a previous ISO path, update the `baseurl` line only.

Refresh the yum metadata cache:

```bash
yum clean all
yum makecache
```

---

### Step 3 — Apply the OS Update

Run `yum update` to apply the packages from the local repository:

```bash
yum update --disablerepo='*' --enablerepo='lithium-OS_local' -y
```

Confirm all expected packages were updated:

```bash
yum history info last
```

If the update includes a kernel package, reboot the server and verify it boots with the new kernel:

```bash
reboot
uname -r   # run after reboot to confirm active kernel version
```

---

### Step 4 — Cleanup

Unmount the ISO after the update is complete:

```bash
umount /mnt/lithium-os-update
```

Optionally remove the ISO file from `/tmp/` to free disk space:

```bash
rm /tmp/NMM-OS-24.03.24.06-RHEL8.10-x86_64.iso
```
