18 hours 3 minutes ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- RAM backed block device driver;
- Network block device driver;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bluetooth drivers;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- CXL (Compute Express Link) drivers;
- DAX dirext access to differentiated memory framework;
- Buffer Sharing and Synchronization framework;
- EDAC drivers;
- FireWire subsystem;
- ARM SCMI message protocol;
- ARM SCPI message protocol;
- EFI core;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- Virtio pmem driver;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- Alibaba DDR Sub-System Driveway PMU driver;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- i.MX PM domains;
- Powercap sysfs driver;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- StarFive reset controller drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- Xilinx SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Media staging drivers;
- TCM subsystem;
- Thermal drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- USB Device Class drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- TI TPS6598x USB Power Delivery controller driver;
- USB Type-C Connector System Software Interface driver;
- vDPA drivers;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Virtio drivers;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ceph distributed file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- UBI file system;
- BPF subsystem;
- Network file system (NFS) superblock;
- Virtio network driver;
- Bluetooth subsystem;
- Network traffic control;
- Network sockets;
- TCP network protocol;
- Tracing infrastructure;
- User-space API (UAPI);
- Kernel init infrastructure;
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel fork() syscall;
- Kernel thread helper (kthread);
- Padata parallel execution mechanism;
- RCU subsystem;
- Arbitrary resource management;
- Scheduler infrastructure;
- Signal handling mechanism;
- Static call mechanism;
- Task handling mechanism;
- Timer substystem drivers;
- Maple Tree data structure library;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- L2TP protocol;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- NCSI (Network Controller Sideband Interface) driver;
- Netfilter;
- Netlink;
- RxRPC session sockets;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- AppArmor security module;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- ALSA framework;
- FireWire sound drivers;
- AudioScience HPI driver;
- HD-audio driver;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
- KVM core;
(CVE-2024-50030, CVE-2024-47689, CVE-2024-50088, CVE-2024-50154,
CVE-2024-49994, CVE-2024-50243, CVE-2024-50284, CVE-2024-50207,
CVE-2024-53200, CVE-2024-53155, CVE-2024-50179, CVE-2024-50171,
CVE-2024-53167, CVE-2024-49885, CVE-2024-49869, CVE-2024-49934,
CVE-2024-53089, CVE-2024-50196, CVE-2024-53090, CVE-2024-47675,
CVE-2024-47690, CVE-2024-56674, CVE-2024-50082, CVE-2024-47742,
CVE-2024-53220, CVE-2024-50172, CVE-2024-50009, CVE-2024-49881,
CVE-2024-50249, CVE-2024-47752, CVE-2024-56707, CVE-2024-53105,
CVE-2024-53048, CVE-2024-50148, CVE-2024-50036, CVE-2024-53141,
CVE-2024-50213, CVE-2024-49911, CVE-2024-50285, CVE-2024-56535,
CVE-2024-49882, CVE-2024-50225, CVE-2024-50090, CVE-2024-53063,
CVE-2024-56703, CVE-2024-47687, CVE-2024-53079, CVE-2024-47744,
CVE-2024-50020, CVE-2024-53078, CVE-2024-53176, CVE-2024-53183,
CVE-2024-50248, CVE-2024-50283, CVE-2024-49907, CVE-2024-50084,
CVE-2024-56541, CVE-2024-49979, CVE-2024-53175, CVE-2024-49871,
CVE-2024-47678, CVE-2024-47720, CVE-2024-53059, CVE-2024-56685,
CVE-2024-56702, CVE-2024-50071, CVE-2024-56534, CVE-2024-56745,
CVE-2024-53154, CVE-2024-47736, CVE-2024-49965, CVE-2024-47701,
CVE-2024-50159, CVE-2024-50040, CVE-2024-50274, CVE-2024-49876,
CVE-2024-49895, CVE-2024-50189, CVE-2024-56704, CVE-2024-47681,
CVE-2024-53106, CVE-2024-56744, CVE-2024-53197, CVE-2024-50120,
CVE-2024-50204, CVE-2024-50184, CVE-2024-53095, CVE-2024-50101,
CVE-2024-53146, CVE-2024-50256, CVE-2024-53226, CVE-2024-47712,
CVE-2024-50137, CVE-2024-53131, CVE-2024-49888, CVE-2024-50235,
CVE-2024-50047, CVE-2024-50224, CVE-2024-50142, CVE-2024-50200,
CVE-2024-53085, CVE-2024-49892, CVE-2024-50263, CVE-2024-53150,
CVE-2024-53121, CVE-2024-49977, CVE-2024-50144, CVE-2024-50127,
CVE-2024-53092, CVE-2024-50265, CVE-2024-56691, CVE-2024-53069,
CVE-2024-49902, CVE-2024-47715, CVE-2024-56720, CVE-2024-53127,
CVE-2024-53142, CVE-2024-49862, CVE-2024-49918, CVE-2024-56684,
CVE-2024-50208, CVE-2024-53189, CVE-2024-50103, CVE-2024-56756,
CVE-2024-50273, CVE-2024-56536, CVE-2024-53068, CVE-2024-49878,
CVE-2024-47705, CVE-2024-53113, CVE-2024-50129, CVE-2024-49942,
CVE-2024-50100, CVE-2024-49930, CVE-2024-50043, CVE-2024-53198,
CVE-2024-49861, CVE-2024-50124, CVE-2024-50209, CVE-2024-53187,
CVE-2024-49864, CVE-2024-56689, CVE-2024-50294, CVE-2024-47706,
CVE-2024-50186, CVE-2024-53086, CVE-2024-49954, CVE-2024-56692,
CVE-2024-47679, CVE-2024-53109, CVE-2024-50001, CVE-2024-49983,
CVE-2024-56679, CVE-2024-50034, CVE-2024-50276, CVE-2024-56680,
CVE-2024-49988, CVE-2024-53099, CVE-2024-50021, CVE-2024-50022,
CVE-2024-50136, CVE-2024-53193, CVE-2024-50220, CVE-2024-49858,
CVE-2024-50229, CVE-2024-50074, CVE-2024-50002, CVE-2024-53117,
CVE-2024-50176, CVE-2024-50075, CVE-2024-50045, CVE-2024-49924,
CVE-2024-47686, CVE-2024-50104, CVE-2024-47714, CVE-2024-50291,
CVE-2024-49929, CVE-2024-53215, CVE-2024-50157, CVE-2024-50147,
CVE-2024-49898, CVE-2024-50164, CVE-2024-47711, CVE-2024-53082,
CVE-2024-50230, CVE-2024-50152, CVE-2024-53218, CVE-2024-53199,
CVE-2024-50253, CVE-2024-47754, CVE-2024-49910, CVE-2024-53137,
CVE-2024-50128, CVE-2024-50044, CVE-2024-47719, CVE-2024-53188,
CVE-2024-53061, CVE-2024-49944, CVE-2024-50091, CVE-2024-49945,
CVE-2024-50119, CVE-2024-50133, CVE-2024-50033, CVE-2024-53083,
CVE-2024-50138, CVE-2024-49872, CVE-2024-50140, CVE-2024-56727,
CVE-2024-50003, CVE-2024-50015, CVE-2024-50303, CVE-2024-50258,
CVE-2024-49867, CVE-2024-50116, CVE-2024-47716, CVE-2024-50132,
CVE-2024-50055, CVE-2024-49950, CVE-2024-50203, CVE-2024-47695,
CVE-2024-50250, CVE-2024-50165, CVE-2024-50156, CVE-2024-56700,
CVE-2024-49913, CVE-2024-50281, CVE-2024-53045, CVE-2024-49998,
CVE-2024-53180, CVE-2024-50271, CVE-2024-50286, CVE-2024-49887,
CVE-2024-53168, CVE-2024-47676, CVE-2024-47726, CVE-2024-47732,
CVE-2024-47704, CVE-2024-49980, CVE-2024-49931, CVE-2024-53229,
CVE-2024-50141, CVE-2024-50282, CVE-2024-50233, CVE-2024-56725,
CVE-2024-50239, CVE-2024-50299, CVE-2024-50218, CVE-2024-53072,
CVE-2024-49903, CVE-2024-50163, CVE-2024-53100, CVE-2024-50146,
CVE-2024-49859, CVE-2024-50227, CVE-2024-50188, CVE-2024-56739,
CVE-2024-53217, CVE-2024-53118, CVE-2024-49946, CVE-2024-53212,
CVE-2024-49926, CVE-2024-53177, CVE-2024-56741, CVE-2024-53234,
CVE-2024-49932, CVE-2024-50095, CVE-2024-50190, CVE-2024-49995,
CVE-2024-49976, CVE-2024-49906, CVE-2024-49996, CVE-2024-53049,
CVE-2024-47751, CVE-2024-56677, CVE-2024-56724, CVE-2024-47746,
CVE-2024-50245, CVE-2024-53236, CVE-2024-53191, CVE-2024-50112,
CVE-2024-49937, CVE-2024-50234, CVE-2024-50067, CVE-2024-53112,
CVE-2024-50017, CVE-2024-50008, CVE-2024-50194, CVE-2024-50076,
CVE-2024-47697, CVE-2024-56693, CVE-2024-50280, CVE-2024-50182,
CVE-2024-53237, CVE-2024-50011, CVE-2024-49912, CVE-2024-50217,
CVE-2024-56532, CVE-2024-53221, CVE-2024-50206, CVE-2024-47700,
CVE-2024-56537, CVE-2024-49959, CVE-2024-56681, CVE-2024-49936,
CVE-2024-49900, CVE-2024-53077, CVE-2024-56705, CVE-2024-53125,
CVE-2024-49968, CVE-2024-49969, CVE-2024-56545, CVE-2024-50106,
CVE-2024-53160, CVE-2024-50013, CVE-2024-49880, CVE-2024-53228,
CVE-2024-50177, CVE-2024-47684, CVE-2024-47739, CVE-2024-50029,
CVE-2024-53194, CVE-2024-50237, CVE-2024-50035, CVE-2024-49941,
CVE-2024-49947, CVE-2024-50289, CVE-2024-49949, CVE-2024-50023,
CVE-2024-50139, CVE-2024-49886, CVE-2024-50026, CVE-2024-56748,
CVE-2024-53080, CVE-2024-56754, CVE-2024-49999, CVE-2024-49963,
CVE-2024-49855, CVE-2024-50252, CVE-2024-49975, CVE-2024-50107,
CVE-2024-56749, CVE-2024-49928, CVE-2024-49865, CVE-2024-50125,
CVE-2024-49899, CVE-2024-47750, CVE-2024-53152, CVE-2024-50081,
CVE-2024-49891, CVE-2024-49927, CVE-2024-49852, CVE-2024-50085,
CVE-2024-50185, CVE-2024-50205, CVE-2024-49896, CVE-2024-50278,
CVE-2024-49866, CVE-2024-53190, CVE-2024-50251, CVE-2024-50269,
CVE-2024-49889, CVE-2024-50037, CVE-2024-53144, CVE-2024-53138,
CVE-2024-50087, CVE-2024-56678, CVE-2024-53087, CVE-2024-50180,
CVE-2024-49940, CVE-2024-50019, CVE-2024-53149, CVE-2024-50122,
CVE-2024-50038, CVE-2024-53156, CVE-2024-49943, CVE-2024-50113,
CVE-2024-47721, CVE-2024-53076, CVE-2024-50115, CVE-2024-50178,
CVE-2024-50268, CVE-2024-50279, CVE-2024-53134, CVE-2024-50199,
CVE-2024-49989, CVE-2024-47671, CVE-2024-49909, CVE-2024-53173,
CVE-2024-53053, CVE-2024-53088, CVE-2024-50078, CVE-2024-50105,
CVE-2024-50223, CVE-2024-50126, CVE-2024-47680, CVE-2024-47724,
CVE-2024-53047, CVE-2024-50060, CVE-2024-53056, CVE-2024-49987,
CVE-2024-49879, CVE-2024-53128, CVE-2024-53123, CVE-2024-49981,
CVE-2024-50277, CVE-2024-50166, CVE-2024-53067, CVE-2024-49964,
CVE-2024-56728, CVE-2024-49853, CVE-2024-53064, CVE-2024-56531,
CVE-2024-53213, CVE-2024-50246, CVE-2024-50192, CVE-2024-53184,
CVE-2024-56697, CVE-2024-47710, CVE-2024-53052, CVE-2024-47718,
CVE-2024-49938, CVE-2024-49893, CVE-2024-53133, CVE-2024-50096,
CVE-2024-53129, CVE-2024-49951, CVE-2024-53181, CVE-2024-50059,
CVE-2024-50193, CVE-2024-53120, CVE-2024-50114, CVE-2024-49962,
CVE-2024-49921, CVE-2024-50298, CVE-2024-50255, CVE-2024-53219,
CVE-2024-49905, CVE-2024-50211, CVE-2024-49860, CVE-2024-47727,
CVE-2024-50028, CVE-2024-47723, CVE-2024-53081, CVE-2024-56683,
CVE-2024-49897, CVE-2024-50065, CVE-2024-56708, CVE-2024-50151,
CVE-2023-52917, CVE-2024-56538, CVE-2024-47691, CVE-2024-53196,
CVE-2024-50150, CVE-2024-50069, CVE-2024-50301, CVE-2024-50131,
CVE-2024-53110, CVE-2024-56701, CVE-2024-53115, CVE-2024-53062,
CVE-2024-50058, CVE-2024-53148, CVE-2024-53147, CVE-2024-50226,
CVE-2024-56540, CVE-2024-53124, CVE-2024-50170, CVE-2024-50266,
CVE-2024-50296, CVE-2024-49953, CVE-2024-47692, CVE-2024-49916,
CVE-2024-53239, CVE-2024-50173, CVE-2024-49868, CVE-2024-47677,
CVE-2024-49972, CVE-2024-50130, CVE-2024-56698, CVE-2024-50231,
CVE-2024-50272, CVE-2024-53153, CVE-2024-50158, CVE-2024-53046,
CVE-2024-49908, CVE-2024-47709, CVE-2024-53058, CVE-2024-50006,
CVE-2024-49948, CVE-2024-47685, CVE-2024-47693, CVE-2024-50260,
CVE-2024-50079, CVE-2024-50149, CVE-2024-53151, CVE-2024-47757,
CVE-2024-49917, CVE-2024-50288, CVE-2024-50117, CVE-2024-50039,
CVE-2024-56690, CVE-2024-50293, CVE-2024-50145, CVE-2024-53166,
CVE-2024-47713, CVE-2024-53158, CVE-2024-50068, CVE-2024-53074,
CVE-2024-49914, CVE-2024-49870, CVE-2024-50031, CVE-2024-47735,
CVE-2024-50007, CVE-2024-49915, CVE-2024-47699, CVE-2024-50244,
CVE-2024-50216, CVE-2024-53114, CVE-2024-53043, CVE-2024-47688,
CVE-2024-47734, CVE-2024-53230, CVE-2024-53122, CVE-2024-50123,
CVE-2024-53116, CVE-2024-56726, CVE-2024-56747, CVE-2024-56548,
CVE-2024-50174, CVE-2024-53042, CVE-2024-53135, CVE-2024-50080,
CVE-2024-49997, CVE-2024-49974, CVE-2024-53145, CVE-2024-53075,
CVE-2024-47730, CVE-2024-50304, CVE-2024-50161, CVE-2024-49883,
CVE-2024-53111, CVE-2024-53233, CVE-2024-47698, CVE-2024-50012,
CVE-2024-50240, CVE-2024-53163, CVE-2024-53071, CVE-2024-50168,
CVE-2024-47740, CVE-2024-50275, CVE-2024-49961, CVE-2024-50183,
CVE-2024-53203, CVE-2024-47738, CVE-2024-49856, CVE-2024-50014,
CVE-2024-50191, CVE-2024-46869, CVE-2024-56721, CVE-2024-50056,
CVE-2024-53210, CVE-2024-49978, CVE-2024-53161, CVE-2024-50155,
CVE-2024-50270, CVE-2024-50169, CVE-2024-49952, CVE-2024-50236,
CVE-2024-49863, CVE-2024-49857, CVE-2024-53140, CVE-2024-53107,
CVE-2024-50247, CVE-2024-53084, CVE-2024-50077, CVE-2024-50121,
CVE-2024-53091, CVE-2024-49925, CVE-2024-47745, CVE-2024-50086,
CVE-2024-53101, CVE-2024-56729, CVE-2024-56751, CVE-2024-50016,
CVE-2024-49901, CVE-2024-47694, CVE-2024-53098, CVE-2024-53232,
CVE-2024-50108, CVE-2024-50197, CVE-2024-50242, CVE-2024-50222,
CVE-2024-53132, CVE-2024-50212, CVE-2024-49933, CVE-2024-53169,
CVE-2024-49957, CVE-2024-56533, CVE-2024-47708, CVE-2024-50267,
CVE-2024-56723, CVE-2024-50110, CVE-2024-50064, CVE-2024-56722,
CVE-2024-53130, CVE-2024-53208, CVE-2024-50102, CVE-2024-50153,
CVE-2024-49939, CVE-2024-53094, CVE-2024-50262, CVE-2024-49850,
CVE-2024-53195, CVE-2024-53170, CVE-2024-50093, CVE-2024-53223,
CVE-2024-53093, CVE-2024-56699, CVE-2024-50070, CVE-2024-49992,
CVE-2024-50111, CVE-2024-47728, CVE-2024-53202, CVE-2024-47741,
CVE-2024-49920, CVE-2024-56694, CVE-2024-53126, CVE-2024-49851,
CVE-2024-50099, CVE-2024-50302, CVE-2024-50214, CVE-2024-49973,
CVE-2024-50024, CVE-2024-50162, CVE-2024-53214, CVE-2024-50073,
CVE-2024-50061, CVE-2024-56549, CVE-2024-56688, CVE-2024-49960,
CVE-2024-56543, CVE-2024-53178, CVE-2024-50027, CVE-2024-50295,
CVE-2024-53104, CVE-2024-53065, CVE-2024-47747, CVE-2024-49991,
CVE-2024-50202, CVE-2024-49935, CVE-2024-50062, CVE-2024-50094,
CVE-2024-56544, CVE-2024-50010, CVE-2024-49971, CVE-2024-50083,
CVE-2024-56687, CVE-2024-47753, CVE-2024-50297, CVE-2024-47733,
CVE-2024-50135, CVE-2024-50066, CVE-2024-50118, CVE-2024-56746,
CVE-2024-47682, CVE-2024-53165, CVE-2024-50025, CVE-2024-49875,
CVE-2024-47717, CVE-2024-49894, CVE-2024-50198, CVE-2024-50167,
CVE-2024-49958, CVE-2024-49966, CVE-2024-50254, CVE-2024-49904,
CVE-2024-50041, CVE-2024-50005, CVE-2024-53066, CVE-2024-50000,
CVE-2024-50215, CVE-2024-47748, CVE-2024-56742, CVE-2024-50259,
CVE-2024-50092, CVE-2024-47737, CVE-2024-53238, CVE-2024-50300,
CVE-2024-53192, CVE-2024-47696, CVE-2024-50134, CVE-2024-50201,
CVE-2024-50181, CVE-2024-49873, CVE-2024-50187, CVE-2024-53171,
CVE-2024-50160, CVE-2024-49923, CVE-2024-50063, CVE-2024-53174,
CVE-2024-50143, CVE-2024-49982, CVE-2024-56546, CVE-2024-50109,
CVE-2024-53119, CVE-2024-47707, CVE-2024-56696, CVE-2024-53108,
CVE-2024-47731, CVE-2024-50261, CVE-2024-50042, CVE-2024-49884,
CVE-2024-53162, CVE-2024-56755, CVE-2024-49919, CVE-2024-53216,
CVE-2024-50287, CVE-2024-53143, CVE-2024-50257, CVE-2024-49890,
CVE-2024-53172, CVE-2024-53209, CVE-2024-49956, CVE-2024-50238,
CVE-2024-49955, CVE-2024-50046, CVE-2024-50098, CVE-2024-50232,
CVE-2024-50292, CVE-2024-56752, CVE-2024-50195, CVE-2024-47743,
CVE-2024-53044, CVE-2024-50049, CVE-2024-49986, CVE-2024-53055,
CVE-2024-56539, CVE-2024-50048, CVE-2024-49985, CVE-2024-53227,
CVE-2024-49970, CVE-2024-47702, CVE-2024-49874, CVE-2024-47703,
CVE-2024-53139, CVE-2024-50072, CVE-2024-53224, CVE-2024-49877,
CVE-2024-49922, CVE-2024-50290, CVE-2024-47756, CVE-2024-50221,
CVE-2024-50057, CVE-2022-49034, CVE-2024-53157, CVE-2024-47749,
CVE-2024-53231)
18 hours 38 minutes ago
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- RAM backed block device driver;
- Network block device driver;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bluetooth drivers;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- CXL (Compute Express Link) drivers;
- DAX dirext access to differentiated memory framework;
- Buffer Sharing and Synchronization framework;
- EDAC drivers;
- FireWire subsystem;
- ARM SCMI message protocol;
- ARM SCPI message protocol;
- EFI core;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- Virtio pmem driver;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- Alibaba DDR Sub-System Driveway PMU driver;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- i.MX PM domains;
- Powercap sysfs driver;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- StarFive reset controller drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- Xilinx SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Media staging drivers;
- TCM subsystem;
- Thermal drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- USB Device Class drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- TI TPS6598x USB Power Delivery controller driver;
- USB Type-C Connector System Software Interface driver;
- vDPA drivers;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Virtio drivers;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ceph distributed file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- UBI file system;
- BPF subsystem;
- Network file system (NFS) superblock;
- Virtio network driver;
- Bluetooth subsystem;
- Network traffic control;
- Network sockets;
- TCP network protocol;
- Tracing infrastructure;
- User-space API (UAPI);
- Kernel init infrastructure;
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel fork() syscall;
- Kernel thread helper (kthread);
- Padata parallel execution mechanism;
- RCU subsystem;
- Arbitrary resource management;
- Scheduler infrastructure;
- Signal handling mechanism;
- Static call mechanism;
- Task handling mechanism;
- Timer substystem drivers;
- Maple Tree data structure library;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- L2TP protocol;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- NCSI (Network Controller Sideband Interface) driver;
- Netfilter;
- Netlink;
- RxRPC session sockets;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- AppArmor security module;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- ALSA framework;
- FireWire sound drivers;
- AudioScience HPI driver;
- HD-audio driver;
- SoC Audio for Freescale CPUs drivers;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
- KVM core;
(CVE-2024-53192, CVE-2024-53130, CVE-2024-53234, CVE-2024-49986,
CVE-2024-49948, CVE-2024-49976, CVE-2024-53158, CVE-2024-50142,
CVE-2024-53160, CVE-2024-50124, CVE-2024-50055, CVE-2024-56744,
CVE-2024-53128, CVE-2024-50204, CVE-2024-50176, CVE-2024-50294,
CVE-2024-50166, CVE-2024-49906, CVE-2024-50074, CVE-2024-47734,
CVE-2024-50249, CVE-2024-53216, CVE-2024-53162, CVE-2024-50189,
CVE-2024-53196, CVE-2024-49969, CVE-2024-53210, CVE-2024-50300,
CVE-2024-47714, CVE-2024-50158, CVE-2024-49983, CVE-2024-49959,
CVE-2024-49985, CVE-2024-53078, CVE-2024-53180, CVE-2024-50099,
CVE-2024-50009, CVE-2024-53059, CVE-2024-49962, CVE-2024-56755,
CVE-2024-50106, CVE-2024-53184, CVE-2024-53063, CVE-2024-50161,
CVE-2024-50289, CVE-2024-56705, CVE-2024-56697, CVE-2024-53135,
CVE-2024-47676, CVE-2024-53084, CVE-2024-50270, CVE-2024-50078,
CVE-2024-50247, CVE-2024-50075, CVE-2024-49946, CVE-2024-50209,
CVE-2024-53048, CVE-2024-53071, CVE-2024-49930, CVE-2024-50174,
CVE-2024-50039, CVE-2024-50115, CVE-2024-56680, CVE-2024-49901,
CVE-2024-49971, CVE-2024-50180, CVE-2024-50061, CVE-2024-47681,
CVE-2024-50107, CVE-2024-49972, CVE-2024-49889, CVE-2024-49872,
CVE-2024-50067, CVE-2024-47718, CVE-2024-50246, CVE-2024-53090,
CVE-2024-49961, CVE-2024-56549, CVE-2024-47688, CVE-2024-50073,
CVE-2024-47716, CVE-2024-49952, CVE-2024-56749, CVE-2024-47737,
CVE-2024-56739, CVE-2024-56752, CVE-2024-47700, CVE-2024-56741,
CVE-2024-50196, CVE-2024-49881, CVE-2024-50230, CVE-2024-50020,
CVE-2024-49992, CVE-2024-56534, CVE-2024-49883, CVE-2024-50233,
CVE-2024-50057, CVE-2024-53091, CVE-2024-49886, CVE-2024-53144,
CVE-2024-50029, CVE-2024-50240, CVE-2024-56720, CVE-2024-50282,
CVE-2024-50036, CVE-2024-53126, CVE-2024-56702, CVE-2024-50101,
CVE-2024-56696, CVE-2024-50193, CVE-2024-53089, CVE-2024-50263,
CVE-2024-47707, CVE-2024-49925, CVE-2024-50178, CVE-2024-47690,
CVE-2024-53119, CVE-2024-49939, CVE-2024-50274, CVE-2024-50168,
CVE-2024-49963, CVE-2024-50220, CVE-2024-50250, CVE-2024-49966,
CVE-2024-50104, CVE-2024-49968, CVE-2024-47685, CVE-2024-50281,
CVE-2024-50190, CVE-2024-50181, CVE-2024-50304, CVE-2022-49034,
CVE-2024-47726, CVE-2024-50159, CVE-2024-49851, CVE-2024-49933,
CVE-2024-50277, CVE-2024-56729, CVE-2024-49885, CVE-2024-53068,
CVE-2024-50162, CVE-2024-50179, CVE-2024-53072, CVE-2024-47742,
CVE-2024-53083, CVE-2024-50025, CVE-2023-52917, CVE-2024-50269,
CVE-2024-50302, CVE-2024-50293, CVE-2024-50177, CVE-2024-53075,
CVE-2024-50257, CVE-2024-49995, CVE-2024-53076, CVE-2024-49940,
CVE-2024-50114, CVE-2024-50043, CVE-2024-47713, CVE-2024-53081,
CVE-2024-50151, CVE-2024-50211, CVE-2024-53047, CVE-2024-50016,
CVE-2024-56679, CVE-2024-56689, CVE-2024-50008, CVE-2024-47723,
CVE-2024-50285, CVE-2024-49899, CVE-2024-50098, CVE-2024-50000,
CVE-2024-53098, CVE-2024-53175, CVE-2024-49888, CVE-2024-50132,
CVE-2024-49964, CVE-2024-53042, CVE-2024-50295, CVE-2024-50038,
CVE-2024-49905, CVE-2024-50012, CVE-2024-47754, CVE-2024-50017,
CVE-2024-53095, CVE-2024-49978, CVE-2024-56541, CVE-2024-49891,
CVE-2024-50033, CVE-2024-50292, CVE-2024-50037, CVE-2024-53145,
CVE-2024-56747, CVE-2024-50260, CVE-2024-53177, CVE-2024-53229,
CVE-2024-53221, CVE-2024-56677, CVE-2024-53171, CVE-2024-50299,
CVE-2024-50202, CVE-2024-53208, CVE-2024-53105, CVE-2024-50006,
CVE-2024-50149, CVE-2024-50275, CVE-2024-47753, CVE-2024-50212,
CVE-2024-49855, CVE-2024-50145, CVE-2024-53120, CVE-2024-53061,
CVE-2024-53217, CVE-2024-53198, CVE-2024-50165, CVE-2024-49866,
CVE-2024-49994, CVE-2024-50109, CVE-2024-50137, CVE-2024-50245,
CVE-2024-53154, CVE-2024-56724, CVE-2024-53187, CVE-2024-53202,
CVE-2024-49927, CVE-2024-50163, CVE-2024-50152, CVE-2024-53220,
CVE-2024-47741, CVE-2024-50102, CVE-2024-53188, CVE-2024-53116,
CVE-2024-47695, CVE-2024-47702, CVE-2024-49970, CVE-2024-50155,
CVE-2024-53058, CVE-2024-49908, CVE-2024-50256, CVE-2024-53161,
CVE-2024-49893, CVE-2024-53074, CVE-2024-50144, CVE-2024-53219,
CVE-2024-49869, CVE-2024-53133, CVE-2024-50041, CVE-2024-49974,
CVE-2024-50287, CVE-2024-50133, CVE-2024-53183, CVE-2024-49997,
CVE-2024-47749, CVE-2024-53153, CVE-2024-50063, CVE-2024-49852,
CVE-2024-50259, CVE-2024-50013, CVE-2024-56751, CVE-2024-53236,
CVE-2024-49999, CVE-2024-50076, CVE-2024-49923, CVE-2024-50288,
CVE-2024-49867, CVE-2024-49887, CVE-2024-53101, CVE-2024-56725,
CVE-2024-56745, CVE-2024-49863, CVE-2024-49890, CVE-2024-50187,
CVE-2024-50200, CVE-2024-47679, CVE-2024-50077, CVE-2024-50069,
CVE-2024-53114, CVE-2024-50071, CVE-2024-50072, CVE-2024-47705,
CVE-2024-50205, CVE-2024-49975, CVE-2024-50237, CVE-2024-53092,
CVE-2024-49917, CVE-2024-49853, CVE-2024-50103, CVE-2024-53190,
CVE-2024-53215, CVE-2024-50280, CVE-2024-50014, CVE-2024-47756,
CVE-2024-53231, CVE-2024-49856, CVE-2024-50023, CVE-2024-53123,
CVE-2024-56756, CVE-2024-50140, CVE-2024-56699, CVE-2024-47703,
CVE-2024-49958, CVE-2024-56692, CVE-2024-50082, CVE-2024-53181,
CVE-2024-47699, CVE-2024-50154, CVE-2024-49960, CVE-2024-53226,
CVE-2024-56683, CVE-2024-53239, CVE-2024-53104, CVE-2024-50044,
CVE-2024-50255, CVE-2024-50021, CVE-2024-50070, CVE-2024-47740,
CVE-2024-49882, CVE-2024-50232, CVE-2024-47708, CVE-2024-47747,
CVE-2024-49929, CVE-2024-56693, CVE-2024-53124, CVE-2024-50223,
CVE-2024-50265, CVE-2024-53172, CVE-2024-50197, CVE-2024-49915,
CVE-2024-53224, CVE-2024-47684, CVE-2024-50217, CVE-2024-50286,
CVE-2024-47677, CVE-2024-49942, CVE-2024-50026, CVE-2024-50236,
CVE-2024-50086, CVE-2024-50153, CVE-2024-47675, CVE-2024-53112,
CVE-2024-50138, CVE-2024-53045, CVE-2024-53170, CVE-2024-50095,
CVE-2024-50188, CVE-2024-50173, CVE-2024-50019, CVE-2024-50117,
CVE-2024-47746, CVE-2024-50172, CVE-2024-53166, CVE-2024-56721,
CVE-2024-50266, CVE-2024-47696, CVE-2024-47719, CVE-2024-49892,
CVE-2024-56678, CVE-2024-47680, CVE-2024-50296, CVE-2024-53152,
CVE-2024-56536, CVE-2024-50042, CVE-2024-49894, CVE-2024-49897,
CVE-2024-47671, CVE-2024-53064, CVE-2024-53077, CVE-2024-49903,
CVE-2024-53169, CVE-2024-50011, CVE-2024-47710, CVE-2024-53046,
CVE-2024-50046, CVE-2024-53131, CVE-2024-53237, CVE-2024-56707,
CVE-2024-49950, CVE-2024-53079, CVE-2024-56694, CVE-2024-53106,
CVE-2024-49900, CVE-2024-47745, CVE-2024-50301, CVE-2024-50040,
CVE-2024-50183, CVE-2024-56532, CVE-2024-56698, CVE-2024-53139,
CVE-2024-47721, CVE-2024-50062, CVE-2024-50129, CVE-2024-50027,
CVE-2024-49941, CVE-2024-53199, CVE-2024-50185, CVE-2024-49858,
CVE-2024-50024, CVE-2024-50146, CVE-2024-50088, CVE-2024-53111,
CVE-2024-50244, CVE-2024-47697, CVE-2024-53108, CVE-2024-49896,
CVE-2024-49859, CVE-2024-56748, CVE-2024-50111, CVE-2024-53056,
CVE-2024-50283, CVE-2024-49955, CVE-2024-47706, CVE-2024-53214,
CVE-2024-47712, CVE-2024-47678, CVE-2024-53125, CVE-2024-53178,
CVE-2024-53232, CVE-2024-49928, CVE-2024-47731, CVE-2024-53121,
CVE-2024-56540, CVE-2024-50271, CVE-2024-53044, CVE-2024-53132,
CVE-2024-53052, CVE-2024-50195, CVE-2024-50191, CVE-2024-47694,
CVE-2024-49973, CVE-2024-49910, CVE-2024-56746, CVE-2024-56674,
CVE-2024-49871, CVE-2024-50258, CVE-2024-50049, CVE-2024-49951,
CVE-2024-50182, CVE-2024-53174, CVE-2024-50143, CVE-2024-53203,
CVE-2024-53129, CVE-2024-50224, CVE-2024-49943, CVE-2024-50131,
CVE-2024-50221, CVE-2024-53143, CVE-2024-56531, CVE-2024-53055,
CVE-2024-50135, CVE-2024-50279, CVE-2024-50120, CVE-2024-53140,
CVE-2024-50272, CVE-2024-47728, CVE-2024-53167, CVE-2024-56691,
CVE-2024-53223, CVE-2024-49919, CVE-2024-53082, CVE-2024-53213,
CVE-2024-50298, CVE-2024-56681, CVE-2024-53069, CVE-2024-50001,
CVE-2024-50083, CVE-2024-50056, CVE-2024-56544, CVE-2024-49989,
CVE-2024-50251, CVE-2024-50121, CVE-2024-53228, CVE-2024-56700,
CVE-2024-49862, CVE-2024-49870, CVE-2024-50148, CVE-2024-53138,
CVE-2024-50160, CVE-2024-50002, CVE-2024-56533, CVE-2024-46869,
CVE-2024-50118, CVE-2024-50276, CVE-2024-50226, CVE-2024-53146,
CVE-2024-53134, CVE-2024-53165, CVE-2024-56728, CVE-2024-49931,
CVE-2024-50261, CVE-2024-50064, CVE-2024-47711, CVE-2024-53157,
CVE-2024-53113, CVE-2024-49898, CVE-2024-50214, CVE-2024-53085,
CVE-2024-49924, CVE-2024-49944, CVE-2024-47686, CVE-2024-53238,
CVE-2024-56754, CVE-2024-50066, CVE-2024-53189, CVE-2024-49864,
CVE-2024-50093, CVE-2024-50060, CVE-2024-56684, CVE-2024-49861,
CVE-2024-50243, CVE-2024-50007, CVE-2024-50227, CVE-2024-50238,
CVE-2024-49918, CVE-2024-53227, CVE-2024-50119, CVE-2024-53088,
CVE-2024-53100, CVE-2024-47693, CVE-2024-53197, CVE-2024-49932,
CVE-2024-53163, CVE-2024-53118, CVE-2024-47733, CVE-2024-49913,
CVE-2024-56545, CVE-2024-47739, CVE-2024-47709, CVE-2024-50015,
CVE-2024-56690, CVE-2024-56535, CVE-2024-50167, CVE-2024-49965,
CVE-2024-53043, CVE-2024-50092, CVE-2024-50128, CVE-2024-53080,
CVE-2024-56539, CVE-2024-50222, CVE-2024-47724, CVE-2024-49980,
CVE-2024-49860, CVE-2024-50034, CVE-2024-47682, CVE-2024-49949,
CVE-2024-49935, CVE-2024-49914, CVE-2024-47732, CVE-2024-47701,
CVE-2024-53200, CVE-2024-50123, CVE-2024-50100, CVE-2024-56704,
CVE-2024-53115, CVE-2024-49879, CVE-2024-50096, CVE-2024-53062,
CVE-2024-50094, CVE-2024-50105, CVE-2024-49947, CVE-2024-50252,
CVE-2024-56537, CVE-2024-49953, CVE-2024-53067, CVE-2024-50091,
CVE-2024-53148, CVE-2024-50164, CVE-2024-50231, CVE-2024-49874,
CVE-2024-47750, CVE-2024-50206, CVE-2024-50207, CVE-2024-56742,
CVE-2024-50005, CVE-2024-56687, CVE-2024-50157, CVE-2024-50201,
CVE-2024-49921, CVE-2024-56727, CVE-2024-50136, CVE-2024-50126,
CVE-2024-50239, CVE-2024-50268, CVE-2024-50234, CVE-2024-50085,
CVE-2024-47736, CVE-2024-49911, CVE-2024-50198, CVE-2024-47704,
CVE-2024-53233, CVE-2024-49981, CVE-2024-53053, CVE-2024-50139,
CVE-2024-49895, CVE-2024-56688, CVE-2024-50031, CVE-2024-49916,
CVE-2024-53155, CVE-2024-50035, CVE-2024-53230, CVE-2024-47738,
CVE-2024-53099, CVE-2024-53212, CVE-2024-47743, CVE-2024-56701,
CVE-2024-53151, CVE-2024-49934, CVE-2024-53141, CVE-2024-50059,
CVE-2024-49922, CVE-2024-50215, CVE-2024-50022, CVE-2024-50229,
CVE-2024-50184, CVE-2024-50065, CVE-2024-50242, CVE-2024-50003,
CVE-2024-47715, CVE-2024-53093, CVE-2024-49956, CVE-2024-49868,
CVE-2024-49878, CVE-2024-56722, CVE-2024-53156, CVE-2024-49857,
CVE-2024-53110, CVE-2024-47735, CVE-2024-53168, CVE-2024-56543,
CVE-2024-50080, CVE-2024-50068, CVE-2024-49909, CVE-2024-56708,
CVE-2024-50134, CVE-2024-50262, CVE-2024-50303, CVE-2024-50203,
CVE-2024-49957, CVE-2024-50087, CVE-2024-53065, CVE-2024-49920,
CVE-2024-49880, CVE-2024-50110, CVE-2024-49877, CVE-2024-47692,
CVE-2024-50127, CVE-2024-49907, CVE-2024-49937, CVE-2024-49987,
CVE-2024-50141, CVE-2024-56538, CVE-2024-49865, CVE-2024-47689,
CVE-2024-50218, CVE-2024-47720, CVE-2024-53191, CVE-2024-53194,
CVE-2024-50216, CVE-2024-50213, CVE-2024-49988, CVE-2024-53094,
CVE-2024-50186, CVE-2024-50010, CVE-2024-50169, CVE-2024-53107,
CVE-2024-47698, CVE-2024-53142, CVE-2024-49945, CVE-2024-49873,
CVE-2024-53176, CVE-2024-49884, CVE-2024-50112, CVE-2024-50199,
CVE-2024-53122, CVE-2024-50284, CVE-2024-50208, CVE-2024-53218,
CVE-2024-50045, CVE-2024-50028, CVE-2024-50122, CVE-2024-50291,
CVE-2024-50047, CVE-2024-50090, CVE-2024-49876, CVE-2024-47730,
CVE-2024-53195, CVE-2024-56703, CVE-2024-49996, CVE-2024-49954,
CVE-2024-47757, CVE-2024-47717, CVE-2024-49850, CVE-2024-50273,
CVE-2024-47752, CVE-2024-53149, CVE-2024-53173, CVE-2024-50235,
CVE-2024-50150, CVE-2024-50030, CVE-2024-50079, CVE-2024-56546,
CVE-2024-53086, CVE-2024-53150, CVE-2024-49979, CVE-2024-50058,
CVE-2024-50171, CVE-2024-56685, CVE-2024-50254, CVE-2024-47751,
CVE-2024-53193, CVE-2024-53209, CVE-2024-49926, CVE-2024-47748,
CVE-2024-53109, CVE-2024-53066, CVE-2024-50225, CVE-2024-53137,
CVE-2024-50113, CVE-2024-49912, CVE-2024-49998, CVE-2024-50116,
CVE-2024-49977, CVE-2024-47687, CVE-2024-50084, CVE-2024-49982,
CVE-2024-50253, CVE-2024-50290, CVE-2024-47727, CVE-2024-50248,
CVE-2024-50170, CVE-2024-47691, CVE-2024-53147, CVE-2024-50192,
CVE-2024-53117, CVE-2024-49938, CVE-2024-47744, CVE-2024-50147,
CVE-2024-49991, CVE-2024-50048, CVE-2024-53127, CVE-2024-49902,
CVE-2024-50156, CVE-2024-53087, CVE-2024-56548, CVE-2024-50125,
CVE-2024-56723, CVE-2024-50108, CVE-2024-53049, CVE-2024-50081,
CVE-2024-56726, CVE-2024-49875, CVE-2024-50194, CVE-2024-50278,
CVE-2024-49904, CVE-2024-50267, CVE-2024-50297, CVE-2024-50130,
CVE-2024-49936)
1 day 15 hours ago
Bing Shi discovered that Libtasn1 inefficiently handled certificates. An
attacker could possibly use this issue to increase resource utilization
leading to a denial of service.
1 day 16 hours ago
USN-7270-1 fixed a vulnerability in OpenSSH. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that the OpenSSH client incorrectly handled the
non-default VerifyHostKeyDNS option. If that option were enabled, an
attacker could possibly impersonate a server by completely bypassing the
server identity check. (CVE-2025-26465)
1 day 16 hours ago
It was discovered that Atril incorrectly handled certain PDF files.
An attacker could possibly use this issue to cause a denial of service
or to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS.
(CVE-2019-1010006)
Andy Nguyen discovered that Atril incorrectly handled certain images. An
attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 16.04 LTS. (CVE-2019-11459)
Febin Mon Saji discovered that Atril incorrectly handled certain
compressed files. A remote attacker could possibly use this issue to
cause a denial of service or to execute arbitrary code. (CVE-2023-51698)
1 day 18 hours ago
It was discovered that libsndfile incorrectly handled memory when executing
its FLAC codec. If a user or automated system were tricked into processing
a specially crafted sound file, an attacker could possibly use this issue
to cause a denial of service or obtain sensitive information.
(CVE-2021-4156)
It was discovered that libsndfile incorrectly handled certain malformed
OggVorbis files. An attacker could possibly use this issue to cause
libsndfile to crash, resulting in a denial of service. (CVE-2024-50612)
1 day 18 hours ago
Soner Sayakci discovered that Symfony incorrectly handled cookie storage in
the web cache. An attacker could possibly use this issue to obtain
sensitive information and access unauthorized resources. (CVE-2022-24894)
Marco Squarcina discovered that Symfony incorrectly handled the storage of
user session information. An attacker could possibly use this issue to
perform a cross-site request forgery (CSRF) attack. (CVE-2022-24895)
Pierre Rudloff discovered that Symfony incorrectly checked HTML input. An
attacker could possibly use this issue to perform cross site scripting.
(CVE-2023-46734)
Vladimir Dusheyko discovered that Symfony incorrectly sanitized special
input with a PHP directive in URL query strings. An attacker could possibly
use this issue to expose sensitive information or cause a denial of
service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS.
(CVE-2024-50340)
Oleg Andreyev, Antoine Makdessi, and Moritz Rauch discovered that Symfony
incorrectly handled user authentication. An attacker could possibly use
this issue to access unauthorized resources and expose sensitive
information. This issue was only addressed in Ubuntu 24.04 LTS.
(CVE-2024-50341, CVE-2024-51996)
Linus Karlsson and Chris Smith discovered that Symfony returned internal
host information during host resolution. An attacker could possibly use
this issue to obtain sensitive information. This issue only affected Ubuntu
24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50342)
It was discovered that Symfony incorrectly parsed user input through
regular expressions. An attacker could possibly use this issue to expose
sensitive information. (CVE-2024-50343)
Sam Mush discovered that Symfony incorrectly parsed URIs with special
characters. An attacker could possibly use this issue to perform phishing
attacks. (CVE-2024-50345)
1 day 21 hours ago
It was discovered that virtualenv incorrectly handled paths when activating
virtual environments. An attacker could possibly use this issue to execute
arbitrary code.
1 day 21 hours ago
It was discovered that the OpenSSH client incorrectly handled the
non-default VerifyHostKeyDNS option. If that option were enabled, an
attacker could possibly impersonate a server by completely bypassing the
server identity check. (CVE-2025-26465)
It was discovered that OpenSSH incorrectly handled the transport-level ping
facility. A remote attacker could possibly use this issue to cause OpenSSH
clients and servers to consume resources, leading to a denial of service.
This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10.
(CVE-2025-26466)
2 days 2 hours ago
USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it
in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 24.10, and Ubuntu 24.04 LTS.
USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and
Ubuntu 18.04 LTS. This updates fixes it in Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS.
Original advisory details:
Yair Zak discovered that Docker could unexpectedly forward DNS requests
from internal networks in an unexpected manner. An attacker could possibly
use this issue to exfiltrate data by encoding information in DNS queries
to controlled nameservers. This issue was only addressed in
Ubuntu 24.04 LTS. (CVE-2024-29018)
Cory Snider discovered that Docker did not properly handle authorization
plugin request processing. An attacker could possibly use this issue to
bypass authorization controls by forwarding API requests without their
full body, leading to unauthorized actions. (CVE-2024-41110)
3 days 7 hours ago
Ke Sun, Paul Grosen and Alyssa Milburn discovered that some Intel®
Processors did not properly implement Finite State Machines (FSMs) in
Hardware Logic. A local privileged attacker could use this issue to cause a
denial of service. (CVE-2024-31068)
It was discovered that some Intel® Processors with Intel® SGX did not
properly restrict access to the EDECCSSA user leaf function. A local
authenticated attacker could use this issue to cause a denial of
service. (CVE-2024-36293)
Ke Sun, Alyssa Milburn, Benoit Morgan, and Erik Bjorge discovered that the
UEFI firmware for some Intel® processors did not properly restrict
access. An authenticated local attacker could use this issue to cause a
denial of service. (CVE-2024-39279)
6 days ago
It was discovered that Apache ActiveMQ incorrectly handled
authentication. A remote attacker could possibly use this issue to run
arbitrary code. (CVE-2022-41678)
It was discovered that Apache ActiveMQ incorrectly handled
deserialization. A remote attacker could possibly use this issue to run
arbitrary shell commands. (CVE-2023-46604)
6 days 19 hours ago
It was discovered that libsndfile incorrectly handled certain malformed
OggVorbis files. An attacker could possibly use this issue to cause
libsndfile to crash, resulting in a denial of service.
1 week ago
USN-6846-1 fixed vulnerabilities in ansible. The update introduced a
regression in ansible. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Ansible incorrectly handled certain inputs when
using tower_callback parameter. If a user or an automated system were
tricked into opening a specially crafted input file, a remote attacker
could possibly use this issue to obtain sensitive information. This issue
only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-3697)
It was discovered that Ansible incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to perform a
Template Injection. (CVE-2023-5764)
1 week ago
Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in
digiKam, did not correctly parse certain files. An attacker could possibly
use this issue to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2017-0691)
It was discovered that Platinum Upnp SDK, vendored in digiKam, was
vulnerable to a path traversal attack. An attacker could possibly use this
issue to leak sensitive information. This issue only affected
Ubuntu 20.04 LTS. (CVE-2020-19858)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to leak sensitive information. This issue only affected
Ubuntu 20.04 LTS. (CVE-2020-22628)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-35530,
CVE-2020-35531, CVE-2020-35532, CVE-2020-35533)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32142)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-1729)
1 week ago
USN-7256-1 fixed vulnerabilities in Ruby. The update introduced a minor
regression. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Ruby incorrectly handled parsing of an XML document
that has specific XML characters in an attribute value using REXML gem. An
attacker could use this issue to cause Ruby to crash, resulting in a
denial of service.
1 week ago
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- TTY drivers;
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53141, CVE-2024-53103, CVE-2024-40967, CVE-2024-53164)
1 week ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)
1 week ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)
1 week ago
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53103, CVE-2024-53164)
Checked
1 hour 40 minutes ago
Recent content on Ubuntu security notices
Subscribe to Ubuntu feed