USN-7382-1: Linux kernel (OEM) vulnerabilities

Read Time:6 Minute, 7 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– ACPI drivers;
– Drivers core;
– Ublk userspace block driver;
– Virtio block driver;
– Bluetooth drivers;
– Buffer Sharing and Synchronization framework;
– DMA engine subsystem;
– EFI core;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– Hardware monitoring drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Microchip PCI driver;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– STMicroelectronics network drivers;
– NVME drivers;
– PCI subsystem;
– PHY drivers;
– Pin controllers subsystem;
– x86 platform drivers;
– i.MX PM domains;
– Power supply drivers;
– Voltage and Current Regulator drivers;
– SCSI subsystem;
– i.MX SoC drivers;
– SPI subsystem;
– UFS subsystem;
– USB Gadget drivers;
– TDX Guest driver;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– JFFS2 file system;
– JFS file system;
– Network file systems library;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– File system notification infrastructure;
– Overlay file system;
– Diskquota system;
– SMB network file system;
– DRM display driver;
– BPF subsystem;
– VLANs driver;
– KASAN memory debugging framework;
– Memory management;
– StackDepot library;
– Bluetooth subsystem;
– LAPB network protocol;
– Netfilter;
– io_uring subsystem;
– Control group (cgroup);
– DMA mapping infrastructure;
– KCSAN framework;
– Scheduler infrastructure;
– Seccomp subsystem;
– Tracing infrastructure;
– Workqueue subsystem;
– KUnit library;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– Multipath TCP;
– NET/ROM layer;
– Packet sockets;
– RDS protocol;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– TIPC protocol;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
– ALSA framework;
– Intel ASoC drivers;
– SOF drivers;
(CVE-2024-47794, CVE-2025-21653, CVE-2024-55642, CVE-2024-56580,
CVE-2024-36476, CVE-2024-56623, CVE-2024-56773, CVE-2024-48873,
CVE-2024-47141, CVE-2024-57910, CVE-2024-56759, CVE-2024-54460,
CVE-2024-57839, CVE-2024-56625, CVE-2024-55916, CVE-2025-21664,
CVE-2025-21652, CVE-2024-56624, CVE-2024-56574, CVE-2024-50051,
CVE-2025-21655, CVE-2024-56578, CVE-2024-56782, CVE-2024-57939,
CVE-2024-57935, CVE-2024-56647, CVE-2024-57905, CVE-2024-57921,
CVE-2024-56660, CVE-2025-21650, CVE-2025-21631, CVE-2024-56642,
CVE-2024-56552, CVE-2024-57934, CVE-2024-56621, CVE-2024-57881,
CVE-2024-41932, CVE-2024-56770, CVE-2024-57897, CVE-2024-56785,
CVE-2024-56664, CVE-2024-57945, CVE-2024-57938, CVE-2024-56636,
CVE-2024-56572, CVE-2024-43098, CVE-2024-56760, CVE-2024-57916,
CVE-2024-56714, CVE-2025-21660, CVE-2024-57906, CVE-2025-21638,
CVE-2024-53687, CVE-2024-56652, CVE-2024-51729, CVE-2024-49571,
CVE-2024-57883, CVE-2024-54191, CVE-2024-56712, CVE-2024-49568,
CVE-2024-57932, CVE-2024-57893, CVE-2024-56645, CVE-2024-56719,
CVE-2024-56641, CVE-2024-57802, CVE-2024-56775, CVE-2024-56627,
CVE-2024-56638, CVE-2024-57929, CVE-2024-56615, CVE-2024-56566,
CVE-2024-56620, CVE-2024-56577, CVE-2025-21656, CVE-2024-57887,
CVE-2024-52319, CVE-2024-56657, CVE-2024-57872, CVE-2024-56607,
CVE-2024-56562, CVE-2025-21645, CVE-2025-21634, CVE-2024-56567,
CVE-2024-56637, CVE-2025-21646, CVE-2024-57918, CVE-2024-56646,
CVE-2024-57849, CVE-2025-21633, CVE-2025-21639, CVE-2024-56644,
CVE-2024-56618, CVE-2024-56564, CVE-2024-56369, CVE-2024-56766,
CVE-2024-56635, CVE-2024-57907, CVE-2024-56778, CVE-2024-57880,
CVE-2024-57885, CVE-2024-56591, CVE-2024-56780, CVE-2024-57913,
CVE-2024-54680, CVE-2025-21632, CVE-2024-54683, CVE-2025-21654,
CVE-2024-58087, CVE-2024-56772, CVE-2024-56758, CVE-2024-57795,
CVE-2025-21644, CVE-2024-56586, CVE-2024-56663, CVE-2024-56558,
CVE-2024-57882, CVE-2024-56651, CVE-2024-56783, CVE-2024-53681,
CVE-2024-57911, CVE-2024-57879, CVE-2024-56649, CVE-2024-56563,
CVE-2024-56639, CVE-2024-56605, CVE-2024-57888, CVE-2024-56640,
CVE-2024-57841, CVE-2024-56656, CVE-2024-48875, CVE-2024-48876,
CVE-2024-57919, CVE-2024-57940, CVE-2024-56630, CVE-2024-53685,
CVE-2024-56604, CVE-2024-47809, CVE-2024-57889, CVE-2024-56619,
CVE-2024-57806, CVE-2024-56583, CVE-2024-56715, CVE-2025-21640,
CVE-2025-21662, CVE-2024-56662, CVE-2024-55639, CVE-2024-56711,
CVE-2024-56372, CVE-2024-54455, CVE-2024-56771, CVE-2024-56368,
CVE-2024-57892, CVE-2024-57843, CVE-2025-21636, CVE-2024-56650,
CVE-2024-56613, CVE-2024-56716, CVE-2024-57793, CVE-2024-56634,
CVE-2024-56595, CVE-2024-57878, CVE-2024-56598, CVE-2024-39282,
CVE-2024-57908, CVE-2024-57917, CVE-2024-56763, CVE-2024-56629,
CVE-2024-56710, CVE-2024-56671, CVE-2024-56667, CVE-2024-57924,
CVE-2024-57926, CVE-2025-21658, CVE-2024-56594, CVE-2024-56584,
CVE-2024-53179, CVE-2024-56587, CVE-2024-57946, CVE-2024-56717,
CVE-2025-21635, CVE-2024-56779, CVE-2024-57944, CVE-2024-56767,
CVE-2024-56781, CVE-2024-56765, CVE-2024-56609, CVE-2024-54193,
CVE-2024-57804, CVE-2024-56599, CVE-2024-56602, CVE-2024-57901,
CVE-2024-53680, CVE-2024-57801, CVE-2024-57912, CVE-2024-56606,
CVE-2024-56579, CVE-2024-56588, CVE-2024-57895, CVE-2024-56601,
CVE-2024-55641, CVE-2024-56559, CVE-2024-56557, CVE-2025-21661,
CVE-2024-57799, CVE-2024-57850, CVE-2024-57876, CVE-2024-47408,
CVE-2024-57899, CVE-2024-56597, CVE-2024-57890, CVE-2024-56670,
CVE-2024-56603, CVE-2024-56654, CVE-2025-21834, CVE-2024-56590,
CVE-2024-49569, CVE-2024-56616, CVE-2024-56659, CVE-2024-56596,
CVE-2025-21642, CVE-2025-21663, CVE-2025-21648, CVE-2024-56614,
CVE-2024-56673, CVE-2024-56787, CVE-2024-56713, CVE-2024-56573,
CVE-2024-56589, CVE-2024-56764, CVE-2024-56655, CVE-2024-56617,
CVE-2024-56669, CVE-2024-56576, CVE-2024-57792, CVE-2024-57904,
CVE-2024-52332, CVE-2024-57900, CVE-2024-57933, CVE-2024-55881,
CVE-2024-56626, CVE-2024-57894, CVE-2024-56582, CVE-2024-57838,
CVE-2025-21629, CVE-2025-21659, CVE-2024-57809, CVE-2024-47143,
CVE-2024-57925, CVE-2024-41935, CVE-2025-21649, CVE-2024-57884,
CVE-2024-57875, CVE-2025-21647, CVE-2024-56581, CVE-2024-57886,
CVE-2024-57896, CVE-2025-21651, CVE-2024-56611, CVE-2024-56575,
CVE-2024-57807, CVE-2024-56561, CVE-2024-53690, CVE-2024-56761,
CVE-2024-57902, CVE-2024-56600, CVE-2024-56593, CVE-2024-57805,
CVE-2024-56568, CVE-2024-56632, CVE-2024-56622, CVE-2025-21637,
CVE-2024-45828, CVE-2024-56709, CVE-2024-56631, CVE-2025-21643,
CVE-2024-56786, CVE-2024-56565, CVE-2024-57903, CVE-2024-56592,
CVE-2024-56569, CVE-2024-56718, CVE-2024-57791, CVE-2024-56665,
CVE-2024-56774, CVE-2024-56608, CVE-2024-56643, CVE-2024-57931,
CVE-2024-57857, CVE-2024-56777, CVE-2024-53682, CVE-2024-56648,
CVE-2024-56769, CVE-2024-48881, CVE-2024-56776, CVE-2024-57798,
CVE-2024-57874, CVE-2024-56633, CVE-2024-56768, CVE-2024-56653,
CVE-2024-56784, CVE-2024-56550, CVE-2024-56610, CVE-2024-56570,
CVE-2024-56675, CVE-2024-57898, CVE-2024-56551)

Read More

USN-7381-1: Linux kernel (Low Latency) vulnerabilities

Read Time:6 Minute, 24 Second

Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– ACPI drivers;
– Drivers core;
– Ublk userspace block driver;
– Virtio block driver;
– Bluetooth drivers;
– Buffer Sharing and Synchronization framework;
– DMA engine subsystem;
– EFI core;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– Hardware monitoring drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Microchip PCI driver;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– STMicroelectronics network drivers;
– NVME drivers;
– PCI subsystem;
– PHY drivers;
– Pin controllers subsystem;
– x86 platform drivers;
– i.MX PM domains;
– Power supply drivers;
– Voltage and Current Regulator drivers;
– SCSI subsystem;
– i.MX SoC drivers;
– SPI subsystem;
– UFS subsystem;
– USB Gadget drivers;
– TDX Guest driver;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– JFFS2 file system;
– JFS file system;
– Network file systems library;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– File system notification infrastructure;
– Overlay file system;
– Diskquota system;
– SMB network file system;
– DRM display driver;
– BPF subsystem;
– VLANs driver;
– KASAN memory debugging framework;
– Memory management;
– StackDepot library;
– Bluetooth subsystem;
– LAPB network protocol;
– Network namespace;
– Netfilter;
– io_uring subsystem;
– Control group (cgroup);
– DMA mapping infrastructure;
– KCSAN framework;
– Scheduler infrastructure;
– Seccomp subsystem;
– Tracing infrastructure;
– Workqueue subsystem;
– KUnit library;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– Multipath TCP;
– NET/ROM layer;
– Packet sockets;
– RDS protocol;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– TIPC protocol;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
– ALSA framework;
– Intel ASoC drivers;
– SOF drivers;
(CVE-2024-56712, CVE-2024-56761, CVE-2025-21661, CVE-2024-56565,
CVE-2024-57804, CVE-2024-57887, CVE-2025-21642, CVE-2024-56779,
CVE-2025-21656, CVE-2024-57890, CVE-2024-36476, CVE-2024-57843,
CVE-2024-56594, CVE-2024-41932, CVE-2025-21653, CVE-2024-56567,
CVE-2024-56665, CVE-2024-54191, CVE-2024-57893, CVE-2024-57932,
CVE-2024-56656, CVE-2024-57945, CVE-2024-57931, CVE-2024-56599,
CVE-2024-57897, CVE-2024-57903, CVE-2024-57918, CVE-2024-57795,
CVE-2024-56662, CVE-2025-21639, CVE-2024-55881, CVE-2024-57889,
CVE-2024-57884, CVE-2024-57934, CVE-2024-39282, CVE-2024-56718,
CVE-2024-56644, CVE-2024-56760, CVE-2024-43098, CVE-2024-47143,
CVE-2024-55642, CVE-2024-56634, CVE-2024-56564, CVE-2024-56768,
CVE-2024-56649, CVE-2024-57919, CVE-2024-56620, CVE-2024-56625,
CVE-2024-56655, CVE-2024-56772, CVE-2025-21637, CVE-2024-56617,
CVE-2024-57879, CVE-2024-56715, CVE-2024-56550, CVE-2024-50051,
CVE-2024-56673, CVE-2024-51729, CVE-2025-21664, CVE-2025-21649,
CVE-2024-56605, CVE-2024-56622, CVE-2024-56591, CVE-2024-56782,
CVE-2024-57801, CVE-2024-56664, CVE-2024-57916, CVE-2024-53680,
CVE-2024-57926, CVE-2024-56637, CVE-2024-56769, CVE-2024-57924,
CVE-2024-56648, CVE-2024-57872, CVE-2024-56593, CVE-2024-57913,
CVE-2024-53682, CVE-2024-56670, CVE-2024-56767, CVE-2024-56778,
CVE-2024-56777, CVE-2025-21658, CVE-2025-21646, CVE-2024-48875,
CVE-2024-56758, CVE-2024-56604, CVE-2024-56787, CVE-2024-56581,
CVE-2025-21635, CVE-2024-56641, CVE-2024-56608, CVE-2024-57885,
CVE-2024-56716, CVE-2024-56671, CVE-2024-56559, CVE-2025-21633,
CVE-2024-56372, CVE-2024-57888, CVE-2024-56623, CVE-2025-21638,
CVE-2024-56600, CVE-2024-56647, CVE-2025-21659, CVE-2024-41935,
CVE-2024-56624, CVE-2024-56574, CVE-2025-21648, CVE-2024-56621,
CVE-2024-54460, CVE-2024-56659, CVE-2024-47141, CVE-2024-57805,
CVE-2024-57792, CVE-2024-45828, CVE-2024-53681, CVE-2024-56568,
CVE-2024-56764, CVE-2025-21650, CVE-2024-56601, CVE-2024-56663,
CVE-2025-21660, CVE-2025-21629, CVE-2024-56595, CVE-2024-57917,
CVE-2024-53685, CVE-2024-57882, CVE-2024-57894, CVE-2024-56651,
CVE-2024-56657, CVE-2024-57876, CVE-2024-56717, CVE-2024-57935,
CVE-2024-56667, CVE-2024-57910, CVE-2024-57793, CVE-2024-56631,
CVE-2024-56638, CVE-2025-21640, CVE-2024-56710, CVE-2024-56583,
CVE-2024-56557, CVE-2024-56658, CVE-2025-21632, CVE-2024-56645,
CVE-2024-56646, CVE-2024-56640, CVE-2024-57944, CVE-2024-56598,
CVE-2024-57857, CVE-2024-56709, CVE-2024-56654, CVE-2024-57809,
CVE-2024-57895, CVE-2025-21834, CVE-2024-56763, CVE-2024-48881,
CVE-2024-57841, CVE-2024-57878, CVE-2024-56774, CVE-2024-57791,
CVE-2024-56575, CVE-2024-56619, CVE-2024-56570, CVE-2024-56616,
CVE-2024-56569, CVE-2025-21636, CVE-2024-56572, CVE-2024-56552,
CVE-2024-56596, CVE-2025-21654, CVE-2024-56573, CVE-2024-56784,
CVE-2024-56626, CVE-2024-56642, CVE-2024-56643, CVE-2024-56719,
CVE-2024-56632, CVE-2024-57839, CVE-2024-56578, CVE-2024-53690,
CVE-2024-56609, CVE-2024-56562, CVE-2024-56589, CVE-2024-56781,
CVE-2024-56672, CVE-2024-56775, CVE-2024-56713, CVE-2024-56580,
CVE-2024-57874, CVE-2024-56369, CVE-2024-56711, CVE-2025-21651,
CVE-2024-56584, CVE-2024-57904, CVE-2024-54680, CVE-2024-56577,
CVE-2024-56558, CVE-2024-56780, CVE-2024-58087, CVE-2024-57892,
CVE-2025-21644, CVE-2024-57911, CVE-2024-56579, CVE-2025-21663,
CVE-2024-56618, CVE-2024-56766, CVE-2024-56653, CVE-2025-21655,
CVE-2024-56669, CVE-2024-56759, CVE-2024-48876, CVE-2025-21631,
CVE-2024-56765, CVE-2024-56770, CVE-2024-57838, CVE-2025-21634,
CVE-2024-56650, CVE-2024-57939, CVE-2024-56606, CVE-2024-56610,
CVE-2025-21662, CVE-2024-56785, CVE-2024-55916, CVE-2025-21643,
CVE-2024-56586, CVE-2024-56582, CVE-2024-56614, CVE-2024-49571,
CVE-2024-49569, CVE-2024-57798, CVE-2024-56633, CVE-2024-55641,
CVE-2025-21647, CVE-2025-21652, CVE-2024-56757, CVE-2024-56597,
CVE-2024-47794, CVE-2024-57902, CVE-2024-57925, CVE-2024-54683,
CVE-2024-57938, CVE-2024-56615, CVE-2024-57906, CVE-2024-53687,
CVE-2024-57899, CVE-2024-56783, CVE-2024-56786, CVE-2024-56635,
CVE-2024-56551, CVE-2024-53179, CVE-2024-56588, CVE-2024-47408,
CVE-2024-57849, CVE-2024-52319, CVE-2024-56576, CVE-2024-57905,
CVE-2024-57946, CVE-2024-56607, CVE-2024-57806, CVE-2024-57933,
CVE-2024-55639, CVE-2024-56561, CVE-2024-48873, CVE-2024-52332,
CVE-2025-21645, CVE-2024-56602, CVE-2024-56590, CVE-2024-57799,
CVE-2024-57929, CVE-2024-56639, CVE-2024-56613, CVE-2024-56675,
CVE-2024-57912, CVE-2024-57883, CVE-2024-56636, CVE-2024-56592,
CVE-2024-57802, CVE-2024-54455, CVE-2024-57908, CVE-2024-56603,
CVE-2024-57875, CVE-2024-56773, CVE-2024-47809, CVE-2024-56630,
CVE-2024-56587, CVE-2024-56627, CVE-2024-57921, CVE-2024-56660,
CVE-2024-56771, CVE-2024-57886, CVE-2024-57896, CVE-2024-57807,
CVE-2024-57907, CVE-2024-49568, CVE-2024-54193, CVE-2024-56652,
CVE-2024-57940, CVE-2024-57898, CVE-2024-57901, CVE-2024-56714,
CVE-2024-56566, CVE-2024-56563, CVE-2024-56368, CVE-2024-56611,
CVE-2024-56776, CVE-2024-57850, CVE-2024-56629, CVE-2024-57881,
CVE-2024-57880, CVE-2024-57900)

Read More

USN-7380-1: Linux kernel (Low Latency) vulnerabilities

Read Time:6 Minute, 10 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– ACPI drivers;
– Drivers core;
– Ublk userspace block driver;
– Virtio block driver;
– Bluetooth drivers;
– Buffer Sharing and Synchronization framework;
– DMA engine subsystem;
– EFI core;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– Hardware monitoring drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Microchip PCI driver;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– STMicroelectronics network drivers;
– NVME drivers;
– PCI subsystem;
– PHY drivers;
– Pin controllers subsystem;
– x86 platform drivers;
– i.MX PM domains;
– Power supply drivers;
– Voltage and Current Regulator drivers;
– SCSI subsystem;
– i.MX SoC drivers;
– SPI subsystem;
– UFS subsystem;
– USB Gadget drivers;
– TDX Guest driver;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– JFFS2 file system;
– JFS file system;
– Network file systems library;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– File system notification infrastructure;
– Overlay file system;
– Diskquota system;
– SMB network file system;
– DRM display driver;
– BPF subsystem;
– VLANs driver;
– KASAN memory debugging framework;
– Memory management;
– StackDepot library;
– Bluetooth subsystem;
– LAPB network protocol;
– Network namespace;
– Netfilter;
– io_uring subsystem;
– Control group (cgroup);
– DMA mapping infrastructure;
– KCSAN framework;
– Scheduler infrastructure;
– Seccomp subsystem;
– Tracing infrastructure;
– Workqueue subsystem;
– KUnit library;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– Multipath TCP;
– NET/ROM layer;
– Packet sockets;
– RDS protocol;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– TIPC protocol;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
– ALSA framework;
– Intel ASoC drivers;
– SOF drivers;
(CVE-2024-57850, CVE-2024-57895, CVE-2024-57843, CVE-2024-56587,
CVE-2024-56590, CVE-2024-56584, CVE-2024-56673, CVE-2024-56552,
CVE-2024-56644, CVE-2024-57940, CVE-2024-47809, CVE-2024-56784,
CVE-2024-57935, CVE-2024-56561, CVE-2025-21642, CVE-2024-56573,
CVE-2024-53682, CVE-2024-39282, CVE-2024-56653, CVE-2024-56606,
CVE-2024-56651, CVE-2024-56608, CVE-2024-56649, CVE-2024-56761,
CVE-2024-57921, CVE-2024-57804, CVE-2024-57902, CVE-2024-56630,
CVE-2024-56769, CVE-2024-56782, CVE-2025-21652, CVE-2025-21634,
CVE-2024-48881, CVE-2024-41935, CVE-2024-57912, CVE-2024-56659,
CVE-2025-21663, CVE-2024-57857, CVE-2024-56670, CVE-2024-56631,
CVE-2024-52319, CVE-2024-56637, CVE-2024-56643, CVE-2025-21643,
CVE-2024-55881, CVE-2024-56619, CVE-2024-53687, CVE-2025-21654,
CVE-2025-21655, CVE-2024-56648, CVE-2024-57893, CVE-2025-21651,
CVE-2024-57939, CVE-2024-56622, CVE-2024-56763, CVE-2024-56591,
CVE-2024-56559, CVE-2024-57883, CVE-2024-56592, CVE-2024-57795,
CVE-2024-56578, CVE-2024-56780, CVE-2024-57904, CVE-2024-57934,
CVE-2024-56369, CVE-2024-57931, CVE-2024-47408, CVE-2025-21644,
CVE-2024-56625, CVE-2025-21659, CVE-2024-56640, CVE-2024-56605,
CVE-2024-56638, CVE-2024-56775, CVE-2024-47141, CVE-2024-56773,
CVE-2024-53681, CVE-2024-57802, CVE-2024-56550, CVE-2024-56717,
CVE-2025-21662, CVE-2024-53685, CVE-2024-57890, CVE-2024-56765,
CVE-2025-21629, CVE-2024-57918, CVE-2024-57841, CVE-2024-57894,
CVE-2025-21649, CVE-2024-56613, CVE-2024-56611, CVE-2024-57946,
CVE-2024-57908, CVE-2024-57900, CVE-2024-56665, CVE-2024-56786,
CVE-2024-56778, CVE-2024-56627, CVE-2024-56712, CVE-2024-52332,
CVE-2025-21834, CVE-2024-56616, CVE-2024-56595, CVE-2024-56623,
CVE-2024-57807, CVE-2024-41932, CVE-2024-57809, CVE-2024-54193,
CVE-2025-21637, CVE-2024-54455, CVE-2024-56565, CVE-2024-57849,
CVE-2024-56647, CVE-2024-57896, CVE-2024-57924, CVE-2024-57944,
CVE-2024-56711, CVE-2024-57881, CVE-2024-56614, CVE-2024-54460,
CVE-2024-56563, CVE-2024-58087, CVE-2024-57798, CVE-2024-56615,
CVE-2024-53179, CVE-2024-57919, CVE-2024-56580, CVE-2024-56771,
CVE-2024-56572, CVE-2024-56581, CVE-2024-56586, CVE-2024-56654,
CVE-2024-57916, CVE-2024-56645, CVE-2024-56672, CVE-2024-56597,
CVE-2024-56671, CVE-2024-56658, CVE-2024-56634, CVE-2024-49568,
CVE-2024-56588, CVE-2024-56655, CVE-2024-48876, CVE-2024-57889,
CVE-2025-21647, CVE-2024-47794, CVE-2024-57938, CVE-2024-56767,
CVE-2025-21664, CVE-2024-56656, CVE-2024-56787, CVE-2024-57925,
CVE-2024-57876, CVE-2024-57874, CVE-2024-56766, CVE-2024-57878,
CVE-2024-57898, CVE-2024-56617, CVE-2024-56604, CVE-2025-21645,
CVE-2024-56551, CVE-2024-57892, CVE-2024-49571, CVE-2024-45828,
CVE-2024-57911, CVE-2025-21660, CVE-2024-56558, CVE-2024-57805,
CVE-2024-53680, CVE-2024-57839, CVE-2024-56626, CVE-2024-57901,
CVE-2024-56636, CVE-2024-56646, CVE-2024-56667, CVE-2025-21648,
CVE-2024-56660, CVE-2024-56368, CVE-2024-56600, CVE-2024-57793,
CVE-2024-36476, CVE-2024-56610, CVE-2024-57888, CVE-2024-57886,
CVE-2024-57885, CVE-2024-56776, CVE-2025-21635, CVE-2025-21661,
CVE-2024-56576, CVE-2024-56662, CVE-2024-56589, CVE-2024-57806,
CVE-2024-57887, CVE-2025-21650, CVE-2024-56582, CVE-2024-56709,
CVE-2024-57913, CVE-2024-56633, CVE-2024-56639, CVE-2024-56768,
CVE-2024-57799, CVE-2024-56715, CVE-2025-21653, CVE-2024-57929,
CVE-2024-54680, CVE-2024-56635, CVE-2024-57801, CVE-2024-50051,
CVE-2024-56609, CVE-2024-56624, CVE-2024-51729, CVE-2024-56772,
CVE-2024-56785, CVE-2024-56568, CVE-2024-56577, CVE-2025-21646,
CVE-2024-56713, CVE-2024-56567, CVE-2024-56777, CVE-2024-56760,
CVE-2024-57899, CVE-2024-56664, CVE-2024-57879, CVE-2024-56579,
CVE-2024-56758, CVE-2024-56710, CVE-2024-48875, CVE-2024-56574,
CVE-2024-55641, CVE-2024-56663, CVE-2024-55639, CVE-2024-57875,
CVE-2024-57910, CVE-2024-56621, CVE-2024-57791, CVE-2024-56557,
CVE-2024-56774, CVE-2024-56641, CVE-2024-56601, CVE-2024-56603,
CVE-2024-57897, CVE-2024-56594, CVE-2024-57882, CVE-2024-56583,
CVE-2025-21639, CVE-2025-21658, CVE-2024-56575, CVE-2024-57945,
CVE-2024-57907, CVE-2024-56632, CVE-2024-56629, CVE-2025-21632,
CVE-2024-56596, CVE-2024-56602, CVE-2024-54683, CVE-2024-56607,
CVE-2024-56764, CVE-2024-53690, CVE-2024-56719, CVE-2024-56783,
CVE-2024-57905, CVE-2024-57872, CVE-2024-56598, CVE-2024-55916,
CVE-2024-54191, CVE-2024-56779, CVE-2024-57917, CVE-2024-56562,
CVE-2024-56599, CVE-2024-56620, CVE-2024-56650, CVE-2024-57926,
CVE-2024-56757, CVE-2024-56669, CVE-2025-21638, CVE-2024-56675,
CVE-2024-56618, CVE-2024-56593, CVE-2025-21631, CVE-2024-57933,
CVE-2024-55642, CVE-2024-57884, CVE-2024-56652, CVE-2024-57903,
CVE-2024-56657, CVE-2024-56642, CVE-2024-43098, CVE-2024-57838,
CVE-2024-56714, CVE-2024-56716, CVE-2024-56566, CVE-2024-56781,
CVE-2025-21656, CVE-2024-56372, CVE-2024-56718, CVE-2024-57932,
CVE-2024-57906, CVE-2024-56759, CVE-2024-48873, CVE-2024-49569,
CVE-2024-56564, CVE-2024-56770, CVE-2025-21640, CVE-2024-57792,
CVE-2024-56569, CVE-2025-21633, CVE-2025-21636, CVE-2024-47143,
CVE-2024-56570, CVE-2024-57880)

Read More

When Getting Phished Puts You in Mortal Danger

Read Time:4 Minute, 57 Second

Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you your freedom or your life.

The real website of the Ukrainian paramilitary group “Freedom of Russia” legion. The text has been machine-translated from Russian.

Researchers at the security firm Silent Push mapped a network of several dozen phishing domains that spoof the recruitment websites of Ukrainian paramilitary groups, as well as Ukrainian government intelligence sites.

The website legiohliberty[.]army features a carbon copy of the homepage for the Freedom of Russia Legion (a.k.a. “Free Russia Legion”), a three-year-old Ukraine-based paramilitary unit made up of Russian citizens who oppose Vladimir Putin and his invasion of Ukraine.

The phony version of that website copies the legitimate site — legionliberty[.]army — providing an interactive Google Form where interested applicants can share their contact and personal details. The form asks visitors to provide their name, gender, age, email address and/or Telegram handle, country, citizenship, experience in the armed forces; political views; motivations for joining; and any bad habits.

“Participation in such anti-war actions is considered illegal in the Russian Federation, and participating citizens are regularly charged and arrested,” Silent Push wrote in a report released today. “All observed campaigns had similar traits and shared a common objective: collecting personal information from site-visiting victims. Our team believes it is likely that this campaign is the work of either Russian Intelligence Services or a threat actor with similarly aligned motives.”

Silent Push’s Zach Edwards said the fake Legion Liberty site shared multiple connections with rusvolcorps[.]net. That domain mimics the recruitment page for a Ukrainian far-right paramilitary group called the Russian Volunteer Corps (rusvolcorps[.]com), and uses a similar Google Forms page to collect information from would-be members.

Other domains Silent Push connected to the phishing scheme include: ciagov[.]icu, which mirrors the content on the official website of the U.S. Central Intelligence Agency; and hochuzhitlife[.]com, which spoofs the Ministry of Defense of Ukraine & General Directorate of Intelligence (whose actual domain is hochuzhit[.]com).

According to Edwards, there are no signs that these phishing sites are being advertised via email. Rather, it appears those responsible are promoting them by manipulating the search engine results shown when someone searches for one of these anti-Putin organizations.

In August 2024, security researcher Artem Tamoian posted on Twitter/X about how he received startlingly different results when he searched for “Freedom of Russia legion” in Russia’s largest domestic search engine Yandex versus Google.com. The top result returned by Google was the legion’s actual website, while the first result on Yandex was a phishing page targeting the group.

“I think at least some of them are surely promoted via search,” Tamoian said of the phishing domains. “My first thread on that accuses Yandex, but apart from Yandex those websites are consistently ranked above legitimate in DuckDuckGo and Bing. Initially, I didn’t realize the scale of it. They keep appearing to this day.”

The results of a search at DuckDuckGo on Mar. 27, 2025 for “Freedom of Russia legion” shows the first result returned is a phishing domain.

Tamoian, a native Russian who left the country in 2019, is the founder of the cyber investigation platform malfors.com. He recently discovered two other sites impersonating the Ukrainian paramilitary groups — legionliberty[.]world and rusvolcorps[.]ru — and reported both to Cloudflare. When Cloudflare responded by blocking the sites with a phishing warning, the real Internet address of these sites was exposed as belonging to a known “bulletproof hosting” network called Stark Industries Solutions Ltd.

Stark Industries Solutions appeared two weeks before Russia invaded Ukraine in February 2022, materializing out of nowhere with hundreds of thousands of Internet addresses in its stable — many of them originally assigned to Russian government organizations. In May 2024, KrebsOnSecurity published a deep dive on Stark, which has repeatedly been used to host infrastructure for distributed denial-of-service (DDoS) attacks, phishing, malware and disinformation campaigns from Russian intelligence agencies and pro-Kremlin hacker groups.

In March 2023, Russia’s Supreme Court designated the Freedom of Russia legion as a terrorist organization, meaning that Russians caught communicating with the group could face between 10 and 20 years in prison.

Tamoian said those searching online for information about these paramilitary groups have become easy prey for Russian security services.

“I started looking into those phishing websites, because I kept stumbling upon news that someone gets arrested for trying to join [the] Ukrainian Army or for trying to help them,” Tamoian told KrebsOnSecurity. “I have also seen reports [of] FSB contacting people impersonating Ukrainian officers, as well as using fake Telegram bots, so I thought fake websites might be an option as well.”

Search results showing news articles about people in Russia being sentenced to lengthy prison terms for attempting to aid Ukrainian paramilitary groups.

Tamoian said reports surface regularly in Russia about people being arrested for trying carry out an action requested by a “Ukrainian recruiter,” with the courts unfailingly imposing harsh sentences regardless of the defendant’s age.

“This keeps happening regularly, but usually there are no details about how exactly the person gets caught,” he said. “All cases related to state treason [and] terrorism are classified, so there are barely any details.”

Tamoian said while he has no direct evidence linking any of the reported arrests and convictions to these phishing sites, he is certain the sites are part of a larger campaign by the Russian government.

“Considering that they keep them alive and keep spawning more, I assume it might be an efficient thing,” he said. “They are on top of DuckDuckGo and Yandex, so it unfortunately works.”

Further reading: Silent Push report, Russian Intelligence Targeting its Citizens and Informants.

Read More

USN-7379-1: Linux kernel vulnerabilities

Read Time:6 Minute, 8 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– ACPI drivers;
– Drivers core;
– Ublk userspace block driver;
– Virtio block driver;
– Bluetooth drivers;
– Buffer Sharing and Synchronization framework;
– DMA engine subsystem;
– EFI core;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– Hardware monitoring drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Microchip PCI driver;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– STMicroelectronics network drivers;
– NVME drivers;
– PCI subsystem;
– PHY drivers;
– Pin controllers subsystem;
– x86 platform drivers;
– i.MX PM domains;
– Power supply drivers;
– Voltage and Current Regulator drivers;
– SCSI subsystem;
– i.MX SoC drivers;
– SPI subsystem;
– UFS subsystem;
– USB Gadget drivers;
– TDX Guest driver;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– JFFS2 file system;
– JFS file system;
– Network file systems library;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– File system notification infrastructure;
– Overlay file system;
– Diskquota system;
– SMB network file system;
– DRM display driver;
– BPF subsystem;
– VLANs driver;
– KASAN memory debugging framework;
– Memory management;
– StackDepot library;
– Bluetooth subsystem;
– LAPB network protocol;
– Netfilter;
– io_uring subsystem;
– Control group (cgroup);
– DMA mapping infrastructure;
– KCSAN framework;
– Scheduler infrastructure;
– Seccomp subsystem;
– Tracing infrastructure;
– Workqueue subsystem;
– KUnit library;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– Multipath TCP;
– NET/ROM layer;
– Packet sockets;
– RDS protocol;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– TIPC protocol;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
– ALSA framework;
– Intel ASoC drivers;
– SOF drivers;
(CVE-2024-57921, CVE-2024-56614, CVE-2024-56558, CVE-2024-56589,
CVE-2024-56662, CVE-2024-56610, CVE-2024-56717, CVE-2024-57890,
CVE-2024-55639, CVE-2024-56562, CVE-2025-21633, CVE-2024-56598,
CVE-2024-47794, CVE-2024-41935, CVE-2024-57901, CVE-2024-56587,
CVE-2024-56581, CVE-2024-56783, CVE-2024-57888, CVE-2024-57809,
CVE-2024-57926, CVE-2025-21650, CVE-2024-56634, CVE-2025-21639,
CVE-2025-21656, CVE-2024-56578, CVE-2025-21632, CVE-2024-56784,
CVE-2025-21644, CVE-2024-56776, CVE-2024-56764, CVE-2024-56652,
CVE-2024-56550, CVE-2024-56569, CVE-2024-57904, CVE-2024-49569,
CVE-2024-56770, CVE-2024-56606, CVE-2024-57806, CVE-2024-56646,
CVE-2024-57895, CVE-2024-57880, CVE-2024-56650, CVE-2024-56591,
CVE-2024-56590, CVE-2024-56642, CVE-2024-56713, CVE-2025-21663,
CVE-2024-57938, CVE-2024-56760, CVE-2024-56583, CVE-2025-21662,
CVE-2024-56629, CVE-2024-47408, CVE-2024-57850, CVE-2024-56777,
CVE-2024-56626, CVE-2024-56773, CVE-2024-56647, CVE-2025-21664,
CVE-2024-56564, CVE-2024-56597, CVE-2024-56623, CVE-2024-57897,
CVE-2024-56670, CVE-2024-56567, CVE-2024-57931, CVE-2024-56761,
CVE-2024-57935, CVE-2024-53690, CVE-2025-21640, CVE-2024-56608,
CVE-2024-57878, CVE-2025-21648, CVE-2024-57898, CVE-2024-57889,
CVE-2024-56644, CVE-2024-56763, CVE-2024-57900, CVE-2024-56575,
CVE-2024-56786, CVE-2025-21635, CVE-2024-56559, CVE-2024-56659,
CVE-2024-56621, CVE-2024-57908, CVE-2024-52319, CVE-2024-43098,
CVE-2024-57838, CVE-2024-56782, CVE-2025-21631, CVE-2024-36476,
CVE-2025-21649, CVE-2024-56667, CVE-2024-49571, CVE-2024-55916,
CVE-2024-57887, CVE-2024-56640, CVE-2024-57801, CVE-2024-57886,
CVE-2024-56582, CVE-2024-56561, CVE-2024-56665, CVE-2024-57805,
CVE-2024-51729, CVE-2024-57857, CVE-2024-57876, CVE-2024-57896,
CVE-2024-57799, CVE-2024-57925, CVE-2024-57917, CVE-2024-56664,
CVE-2024-57913, CVE-2025-21660, CVE-2024-56596, CVE-2024-56671,
CVE-2024-56595, CVE-2024-56781, CVE-2024-57912, CVE-2024-56638,
CVE-2024-56636, CVE-2024-56669, CVE-2024-57945, CVE-2024-56633,
CVE-2024-56605, CVE-2024-57882, CVE-2025-21652, CVE-2024-53179,
CVE-2024-56599, CVE-2024-57892, CVE-2025-21647, CVE-2024-57910,
CVE-2024-57792, CVE-2024-56768, CVE-2024-56711, CVE-2024-47143,
CVE-2024-56577, CVE-2024-56574, CVE-2024-56765, CVE-2024-58087,
CVE-2024-53685, CVE-2024-56787, CVE-2024-56592, CVE-2024-56368,
CVE-2024-56615, CVE-2024-56712, CVE-2024-56648, CVE-2024-57874,
CVE-2024-56653, CVE-2024-56656, CVE-2024-56641, CVE-2024-56719,
CVE-2025-21658, CVE-2024-56637, CVE-2024-56709, CVE-2024-57843,
CVE-2024-56588, CVE-2024-57807, CVE-2024-57939, CVE-2024-56594,
CVE-2024-55642, CVE-2024-57841, CVE-2024-50051, CVE-2024-56663,
CVE-2024-56654, CVE-2024-56369, CVE-2024-57885, CVE-2024-56779,
CVE-2024-56772, CVE-2024-56617, CVE-2024-56624, CVE-2024-56570,
CVE-2024-56639, CVE-2025-21642, CVE-2024-56603, CVE-2024-56604,
CVE-2024-57875, CVE-2025-21653, CVE-2025-21654, CVE-2024-56645,
CVE-2024-56775, CVE-2024-52332, CVE-2024-48875, CVE-2024-41932,
CVE-2024-57804, CVE-2025-21661, CVE-2024-57932, CVE-2024-53681,
CVE-2024-56563, CVE-2024-56609, CVE-2024-57798, CVE-2025-21637,
CVE-2024-57940, CVE-2024-56675, CVE-2024-56630, CVE-2024-56565,
CVE-2024-54460, CVE-2024-56573, CVE-2025-21645, CVE-2024-56715,
CVE-2024-56632, CVE-2024-56622, CVE-2024-56673, CVE-2024-48881,
CVE-2024-56593, CVE-2024-56620, CVE-2024-48876, CVE-2025-21643,
CVE-2024-56657, CVE-2024-57905, CVE-2024-57802, CVE-2024-56766,
CVE-2024-57893, CVE-2024-57894, CVE-2024-57903, CVE-2024-57902,
CVE-2024-57934, CVE-2024-57881, CVE-2024-56602, CVE-2024-47809,
CVE-2024-56580, CVE-2024-57899, CVE-2024-56759, CVE-2024-56586,
CVE-2024-57839, CVE-2024-49568, CVE-2024-56660, CVE-2024-53687,
CVE-2024-57907, CVE-2024-56601, CVE-2024-56767, CVE-2024-57916,
CVE-2024-56616, CVE-2024-56557, CVE-2024-56566, CVE-2024-56643,
CVE-2025-21638, CVE-2024-57879, CVE-2025-21655, CVE-2024-56618,
CVE-2024-56758, CVE-2024-56576, CVE-2024-57849, CVE-2024-56372,
CVE-2024-45828, CVE-2024-57795, CVE-2024-56710, CVE-2024-56568,
CVE-2024-56769, CVE-2025-21834, CVE-2024-56716, CVE-2024-56613,
CVE-2024-56584, CVE-2024-56552, CVE-2025-21659, CVE-2024-57929,
CVE-2024-57946, CVE-2025-21646, CVE-2024-56572, CVE-2024-55881,
CVE-2025-21651, CVE-2024-57924, CVE-2025-21634, CVE-2024-53682,
CVE-2024-57872, CVE-2024-53680, CVE-2024-54680, CVE-2024-57918,
CVE-2024-56780, CVE-2025-21636, CVE-2024-57906, CVE-2024-55641,
CVE-2024-54455, CVE-2024-57919, CVE-2024-54683, CVE-2024-54193,
CVE-2024-56635, CVE-2024-57933, CVE-2024-56611, CVE-2024-56551,
CVE-2024-57883, CVE-2024-57793, CVE-2024-56631, CVE-2024-56600,
CVE-2024-56651, CVE-2024-56714, CVE-2024-39282, CVE-2024-56627,
CVE-2024-56649, CVE-2024-56579, CVE-2024-57791, CVE-2024-56774,
CVE-2024-57944, CVE-2024-57911, CVE-2024-48873, CVE-2024-57884,
CVE-2025-21629, CVE-2024-56778, CVE-2024-56619, CVE-2024-54191,
CVE-2024-56771, CVE-2024-47141, CVE-2024-56757, CVE-2024-56718,
CVE-2024-56655, CVE-2024-56607, CVE-2024-56785, CVE-2024-56625)

Read More

USN-7378-1: Ghostscript vulnerabilities

Read Time:1 Minute, 30 Second

It was discovered that Ghostscript incorrectly serialized DollarBlend in
certain fonts. An attacker could use this issue to cause Ghostscript to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2025-27830)

It was discovered that Ghostscript incorrectly handled the DOCXWRITE
TXTWRITE device. An attacker could use this issue to cause Ghostscript to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and
Ubuntu 24.10. (CVE-2025-27831)

It was discovered that Ghostscript incorrectly handled the NPDL device. An
attacker could use this issue to cause Ghostscript to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2025-27832)

It was discovered that Ghostscript incorrectly handled certain long TTF
file names. An attacker could use this issue to cause Ghostscript to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10.
(CVE-2025-27833)

It was discovered that Ghostscript incorrectly handled oversized Type 4
functions in certain PDF documents. An attacker could use this issue to
cause Ghostscript to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu
24.04 LTS, and Ubuntu 24.10. (CVE-2025-27834)

It was discovered that Ghostscript incorrectly handled converting certain
glyphs to Unicode. An attacker could use this issue to cause Ghostscript to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2025-27835)

It was discovered that Ghostscript incorrectly handled the BJ10V device. An
attacker could use this issue to cause Ghostscript to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2025-27836)

Read More