USN-7392-1: Linux kernel vulnerabilities

Read Time:4 Minute, 5 Second

Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)

Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– PowerPC architecture;
– S390 architecture;
– SuperH RISC architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Cryptographic API;
– Virtio block driver;
– Data acquisition framework and drivers;
– Hardware crypto device drivers;
– DMA engine subsystem;
– EDAC drivers;
– ARM SCPI message protocol;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Multifunction device drivers;
– MMC subsystem;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– NVME drivers;
– PCI subsystem;
– Pin controllers subsystem;
– x86 platform drivers;
– Real Time Clock drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– QCOM SoC drivers;
– SPI subsystem;
– USB Gadget drivers;
– USB Serial drivers;
– USB Type-C Port Controller Manager driver;
– VFIO drivers;
– Framebuffer layer;
– Xen hypervisor drivers;
– BTRFS file system;
– Ext4 file system;
– F2FS file system;
– GFS2 file system;
– File systems infrastructure;
– JFFS2 file system;
– JFS file system;
– Network file system (NFS) client;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– Overlay file system;
– Proc file system;
– Diskquota system;
– SMB network file system;
– UBI file system;
– Timer subsystem;
– VLANs driver;
– LAPB network protocol;
– Kernel init infrastructure;
– BPF subsystem;
– Kernel CPU control infrastructure;
– Tracing infrastructure;
– Memory management;
– 9P file system network protocol;
– Bluetooth subsystem;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– IEEE 802.15.4 subsystem;
– Netfilter;
– Netlink;
– NET/ROM layer;
– Packet sockets;
– Network traffic control;
– SCTP protocol;
– Sun RPC protocol;
– TIPC protocol;
– eXpress Data Path;
– SELinux security module;
– USB sound devices;
(CVE-2024-56532, CVE-2024-53127, CVE-2024-56574, CVE-2024-56576,
CVE-2024-57922, CVE-2024-53135, CVE-2024-56606, CVE-2024-53155,
CVE-2024-53136, CVE-2024-56769, CVE-2024-56690, CVE-2024-53150,
CVE-2024-38588, CVE-2024-53171, CVE-2024-56748, CVE-2024-56558,
CVE-2024-56595, CVE-2024-56670, CVE-2024-56637, CVE-2024-56739,
CVE-2024-56681, CVE-2024-53158, CVE-2024-53172, CVE-2024-56700,
CVE-2024-56645, CVE-2024-56723, CVE-2024-56572, CVE-2024-57889,
CVE-2024-43098, CVE-2024-56614, CVE-2024-53197, CVE-2025-21640,
CVE-2024-57938, CVE-2024-53140, CVE-2024-57929, CVE-2024-56593,
CVE-2024-56691, CVE-2025-21687, CVE-2024-56770, CVE-2024-53131,
CVE-2024-56531, CVE-2024-56603, CVE-2025-21653, CVE-2024-53239,
CVE-2024-57946, CVE-2024-56581, CVE-2024-56694, CVE-2024-56597,
CVE-2024-57849, CVE-2024-56601, CVE-2024-53156, CVE-2024-56747,
CVE-2024-53146, CVE-2025-21664, CVE-2024-53217, CVE-2025-21638,
CVE-2024-53157, CVE-2024-56688, CVE-2024-47707, CVE-2024-53173,
CVE-2024-56605, CVE-2024-56619, CVE-2024-49925, CVE-2024-49936,
CVE-2024-56586, CVE-2024-57892, CVE-2024-56562, CVE-2024-57902,
CVE-2024-53148, CVE-2024-53194, CVE-2024-56720, CVE-2024-53121,
CVE-2024-48881, CVE-2024-56767, CVE-2024-56780, CVE-2024-56548,
CVE-2024-57931, CVE-2024-56724, CVE-2024-53142, CVE-2024-53214,
CVE-2025-21639, CVE-2024-43900, CVE-2024-56659, CVE-2024-57908,
CVE-2024-57913, CVE-2024-53181, CVE-2024-56630, CVE-2024-56598,
CVE-2024-56539, CVE-2024-57951, CVE-2024-56600, CVE-2024-52332,
CVE-2024-55916, CVE-2024-53130, CVE-2024-56587, CVE-2024-57911,
CVE-2024-57901, CVE-2024-57807, CVE-2024-49996, CVE-2025-21697,
CVE-2024-53198, CVE-2024-53145, CVE-2024-57910, CVE-2022-49034,
CVE-2024-56629, CVE-2024-56570, CVE-2024-57948, CVE-2024-53227,
CVE-2024-56643, CVE-2024-56602, CVE-2024-57904, CVE-2024-56594,
CVE-2024-56615, CVE-2024-53690, CVE-2024-56650, CVE-2025-21699,
CVE-2024-56644, CVE-2024-56631, CVE-2024-53183, CVE-2024-50051,
CVE-2024-49884, CVE-2024-56569, CVE-2024-56596, CVE-2024-57912,
CVE-2024-56781, CVE-2024-57802, CVE-2024-56704, CVE-2024-57850,
CVE-2024-57906, CVE-2025-21678, CVE-2024-56634, CVE-2024-53138,
CVE-2021-47219, CVE-2024-57890, CVE-2024-53112, CVE-2024-53174,
CVE-2024-56756, CVE-2024-56779, CVE-2024-57884, CVE-2024-56746,
CVE-2024-53161, CVE-2024-57900, CVE-2024-56567, CVE-2024-56633,
CVE-2025-21694, CVE-2024-53165, CVE-2024-56642, CVE-2024-53184,
CVE-2024-44938, CVE-2024-53124, CVE-2025-21689, CVE-2024-53680)

Read More

USN-7391-1: Linux kernel vulnerabilities

Read Time:3 Minute, 51 Second

Chenyuan Yang discovered that the CEC driver driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2024-23848)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– PowerPC architecture;
– S390 architecture;
– SuperH RISC architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Cryptographic API;
– Virtio block driver;
– Data acquisition framework and drivers;
– Hardware crypto device drivers;
– DMA engine subsystem;
– EDAC drivers;
– ARM SCPI message protocol;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Multifunction device drivers;
– MMC subsystem;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– NVME drivers;
– PCI subsystem;
– Pin controllers subsystem;
– x86 platform drivers;
– Real Time Clock drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– QCOM SoC drivers;
– SPI subsystem;
– USB Gadget drivers;
– USB Serial drivers;
– USB Type-C Port Controller Manager driver;
– VFIO drivers;
– Framebuffer layer;
– Xen hypervisor drivers;
– BTRFS file system;
– Ext4 file system;
– F2FS file system;
– GFS2 file system;
– File systems infrastructure;
– JFFS2 file system;
– JFS file system;
– Network file system (NFS) client;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– Overlay file system;
– Proc file system;
– Diskquota system;
– SMB network file system;
– UBI file system;
– Timer subsystem;
– VLANs driver;
– LAPB network protocol;
– Kernel init infrastructure;
– BPF subsystem;
– Kernel CPU control infrastructure;
– Tracing infrastructure;
– Memory management;
– 9P file system network protocol;
– Bluetooth subsystem;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– IEEE 802.15.4 subsystem;
– Netfilter;
– Netlink;
– NET/ROM layer;
– Packet sockets;
– Network traffic control;
– SCTP protocol;
– Sun RPC protocol;
– TIPC protocol;
– eXpress Data Path;
– SELinux security module;
– USB sound devices;
(CVE-2024-53172, CVE-2024-56572, CVE-2024-56739, CVE-2024-56643,
CVE-2024-53131, CVE-2024-57904, CVE-2024-53145, CVE-2024-57908,
CVE-2024-53155, CVE-2024-56691, CVE-2024-57901, CVE-2024-56595,
CVE-2024-55916, CVE-2024-50051, CVE-2024-49936, CVE-2024-57900,
CVE-2024-53239, CVE-2024-53142, CVE-2024-57889, CVE-2024-53217,
CVE-2024-56619, CVE-2025-21653, CVE-2024-53140, CVE-2024-53130,
CVE-2024-43098, CVE-2024-56746, CVE-2024-56650, CVE-2024-56723,
CVE-2024-56558, CVE-2024-57884, CVE-2024-56601, CVE-2024-56581,
CVE-2024-57906, CVE-2024-57948, CVE-2024-49996, CVE-2024-56598,
CVE-2025-21638, CVE-2024-49925, CVE-2024-56767, CVE-2024-53127,
CVE-2024-53181, CVE-2024-53194, CVE-2024-57902, CVE-2024-56630,
CVE-2024-56567, CVE-2024-56602, CVE-2024-56562, CVE-2024-56596,
CVE-2024-56570, CVE-2024-56670, CVE-2024-53135, CVE-2024-56629,
CVE-2024-56769, CVE-2024-56637, CVE-2024-56681, CVE-2024-57910,
CVE-2024-57892, CVE-2024-56574, CVE-2024-53121, CVE-2024-56532,
CVE-2025-21689, CVE-2024-53156, CVE-2024-57912, CVE-2024-56597,
CVE-2025-21640, CVE-2024-53690, CVE-2024-56548, CVE-2024-56633,
CVE-2024-43900, CVE-2024-56631, CVE-2021-47219, CVE-2024-56659,
CVE-2024-53158, CVE-2025-21639, CVE-2024-53136, CVE-2024-56615,
CVE-2024-56586, CVE-2024-57946, CVE-2024-57911, CVE-2025-21699,
CVE-2025-21664, CVE-2024-53174, CVE-2024-53184, CVE-2024-53138,
CVE-2024-53680, CVE-2024-56593, CVE-2024-56644, CVE-2024-56720,
CVE-2024-53197, CVE-2024-57802, CVE-2024-53157, CVE-2024-56756,
CVE-2024-53171, CVE-2024-57931, CVE-2024-56600, CVE-2024-53112,
CVE-2024-56770, CVE-2024-53214, CVE-2024-57849, CVE-2024-57890,
CVE-2024-56634, CVE-2024-44938, CVE-2024-53183, CVE-2025-21697,
CVE-2024-57929, CVE-2024-53165, CVE-2024-53161, CVE-2024-53150,
CVE-2024-56606, CVE-2024-56748, CVE-2024-48881, CVE-2024-56594,
CVE-2024-56645, CVE-2024-56781, CVE-2024-56531, CVE-2024-56605,
CVE-2024-56779, CVE-2025-21678, CVE-2024-53227, CVE-2024-56688,
CVE-2024-56576, CVE-2024-56587, CVE-2024-53124, CVE-2024-49884,
CVE-2024-57850, CVE-2024-56569, CVE-2024-53148, CVE-2025-21694,
CVE-2024-56700, CVE-2024-53173, CVE-2024-53198, CVE-2024-52332,
CVE-2024-47707, CVE-2024-56539, CVE-2024-56704, CVE-2024-56747,
CVE-2025-21687, CVE-2024-56690, CVE-2022-49034, CVE-2024-57938,
CVE-2024-57951, CVE-2024-38588, CVE-2024-56603, CVE-2024-57807,
CVE-2024-56780, CVE-2024-57922, CVE-2024-56642, CVE-2024-57913,
CVE-2024-53146, CVE-2024-56614, CVE-2024-56694, CVE-2024-56724)

Read More

USN-7330-2: Ansible regression

Read Time:1 Minute, 54 Second

USN-7330-1 fixed vulnerabilities in Ansible. The update introduced a
regression when attempting to install Ansible on Ubuntu 16.04 LTS.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Ansible did not properly verify certain fields
of X.509 certificates. An attacker could possibly use this issue to
spoof SSL servers if they were able to intercept network communications.
This issue only affected Ubuntu 14.04 LTS. (CVE-2015-3908)

Martin Carpenter discovered that certain connection plugins for Ansible
did not properly restrict users. An attacker with local access could
possibly use this issue to escape a restricted environment via symbolic
links misuse. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-6240)

Robin Schneider discovered that Ansible’s apt_key module did not properly
verify key fingerprints. A remote attacker could possibly use this issue
to perform key injection, leading to the access of sensitive information.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-8614)

It was discovered that Ansible would expose passwords in certain
instances. An attacker could possibly use specially crafted input
related to this issue to access sensitive information. This issue only
affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-10206)

It was discovered that Ansible incorrectly logged sensitive information.
An attacker with local access could possibly use this issue to access
sensitive information. This issue only affected Ubuntu 14.04 LTS, Ubuntu
16.04 LTS, and Ubuntu 18.04 LTS. (CVE-2019-14846)

It was discovered that Ansible’s solaris_zone module accepted input
without performing input checking. A remote attacker could possibly use
this issue to enable the execution of arbitrary code. This issue only
affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-14904)

It was discovered that Ansible did not generate sufficiently random
values, which could lead to the exposure of passwords. An attacker
could possibly use this issue to access sensitive information. This
issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2020-10729)

It was discovered that Ansible’s svn module could disclose passwords to
users within the same node. An attacker could possibly use this issue to
access sensitive information. (CVE-2020-1739)

Read More

Why Healthcare Executives Should Prioritize Security Compliance

Read Time:4 Minute, 15 Second

Content originally published in Cybersecurity Insiders

Introduction

For healthcare executives, prioritizing security compliance is not just about meeting regulatory requirements but also protecting the organization’s reputation, reducing risks, and ensuring business continuity. HITRUST e1 or i1 certification can significantly enhance health plan and patient assurance, reduce security risks, and create opportunities for increased revenue through enhanced trust, improved partnership potential, and more efficient compliance practices. By investing in security compliance and achieving certifications like HITRUST, small to medium sized healthcare organizations can mitigate risks and position themselves for long-term success in an increasingly regulated and competitive industry.

Regulatory Requirements and Legal Consequences

Healthcare organizations increasingly must comply with health plan mandates, federal and state regulations, such as HIPAA (Health Insurance Portability and Accountability Act), and HITECH (Health Information Technology for Economic and Clinical Health Act).
Failure to comply with health plan mandates and federal and state regulations can result in fines, legal consequences, and loss of business partnerships or accreditation.
The rise in ransomware attacks, such as those targeting hospitals and insurance providers, has underscored the importance of securing healthcare systems to ensure patient safety and continuity of care.

Risk Mitigation and Cybersecurity Threats

Healthcare organizations are frequent targets of cyberattacks, especially due to the sensitive nature of health data. Breaches in healthcare data can lead to identity theft, medical fraud, or exposure of personal health information (PHI).
The Verizon 2024 Data Breach Investigations Report on healthcare shows miscellaneous errors, privilege misuse and system intrusion represented 83% of breaches.
Threat actors represent 70% of internal and 30% external breaches with 98% motivated by financial gain and 1% espionage, and data compromise ranging from 75% personal, 51% internal, 25% other, and 13% credentials (Verizon 2024 DBIR).

Trust and Reputation

Patients and partners entrust healthcare organizations with highly sensitive personal and medical information and expect their healthcare providers to safeguard their medical data against cyber threats and data breaches.
If a health plan or provider doesn’t demonstrate compliance it can lead to a loss of patient confidence, lower patient retention, erode trust, and damage an organization’s reputation.
Proactively addressing security compliance helps to ensure that sensitive patient data and systems are adequately protected, reducing the likelihood of breaches.

Operational Continuity

Security compliance frameworks provide structured processes for ensuring that data is protected, backups are secure, and incident response plans are in place to help organizations recover quickly from cyber incidents and maintain the smooth delivery of healthcare services.
Compliance with security standards helps mitigate insider threats, ensure employees are properly trained, and ensure that access to sensitive information is on a need-to-know basis.
Third-party vendors and partners also play a significant role in healthcare operations, Poor third-party security practices can create vulnerabilities in the organization’s security ecosystem.

How Can HITRUST e1 or i1 Certification Help?

Enhancing Health Plan and Patient Assurance

HITRUST certification is highly respected in the healthcare industry and is often required by business partners, vendors, and payers.
Obtaining HITRUST e1 or i1 certification signals to patients, insurers, and partners that the organization is serious about data security, patient privacy, and compliance and provides assurances that the healthcare provider has met rigorous standards for managing and protecting health information.
Certification differentiates healthcare organizations from competitors, making it easier to win new contracts with health plans, insurance providers, and other entities that demand high levels of security and compliance.

Reducing Security Risks

HITRUST certification requires an organization to perform a thorough risk assessment and implement a detailed cybersecurity framework that provides a comprehensive approach to managing risks across access control, incident response, encryption, and data privacy that helps identify potential vulnerabilities in systems, processes, and personnel.
Healthcare organizations can address vulnerabilities proactively by implementing improved security controls, reducing the likelihood of data breaches, cyberattacks, or non-compliance.
HITRUST certification isn’t a one-time event, it requires ongoing assessments and audits to ensure continued adherence to security standards, creating a system of continuous improvement in cybersecurity practices.

Increasing Revenue and Business Growth

By achieving HITRUST e1 or i1 certification, healthcare organizations can expand their business opportunities and increase their revenue potential by qualifying for lucrative partnerships.
Demonstrating a commitment to cybersecurity and compliance helps in negotiating lower premiums for cyber liability insurance as insurers are more likely to offer favorable rates to organizations that have robust risk management and security practices in place.
The HITRUST framework provides a structured approach to managing risks, which can help organizations avoid the high costs associated with data breaches and ransomware attacks where the cost of non-compliance can far exceed the investment in e1 or i1 certification.

Increased Operational Efficiency and Effectiveness

HITRUST e1 and i1 certifications incorporate multiple regulatory frameworks (e.g., HIPAA, NIST, ISO), so healthcare organizations don’t have to manage separate compliance efforts for each regulation which simplifies, reduces administrative overhead, and lowers compliance costs.
Achieving certification requires organizations to codify tribal knowledge and document policies, procedures, and implementation practices related to data security and risk management, which can lead to more efficient operations, reduced duplication of efforts, and greater accountability.

Read More

USN-7387-2: Linux kernel (FIPS) vulnerabilities

Read Time:5 Minute, 29 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– SuperH RISC architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Block layer subsystem;
– Cryptographic API;
– ACPI drivers;
– Drivers core;
– RAM backed block device driver;
– Virtio block driver;
– Data acquisition framework and drivers;
– Hardware crypto device drivers;
– DMA engine subsystem;
– EDAC drivers;
– ARM SCPI message protocol;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Multifunction device drivers;
– MMC subsystem;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– Microsoft Azure Network Adapter (MANA) driver;
– NVME drivers;
– PCI subsystem;
– Pin controllers subsystem;
– x86 platform drivers;
– Power supply drivers;
– Real Time Clock drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– i.MX SoC drivers;
– QCOM SoC drivers;
– SPI subsystem;
– Media staging drivers;
– UFS subsystem;
– DesignWare USB3 driver;
– USB Gadget drivers;
– USB Serial drivers;
– USB Type-C Port Controller Manager driver;
– VFIO drivers;
– Framebuffer layer;
– Xen hypervisor drivers;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– GFS2 file system;
– JFFS2 file system;
– JFS file system;
– Network file system (NFS) client;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– NTFS3 file system;
– Overlay file system;
– Proc file system;
– Diskquota system;
– SMB network file system;
– UBI file system;
– Timer subsystem;
– VLANs driver;
– LAPB network protocol;
– Kernel init infrastructure;
– BPF subsystem;
– Kernel CPU control infrastructure;
– DMA mapping infrastructure;
– KCSAN framework;
– Tracing infrastructure;
– Memory management;
– 9P file system network protocol;
– Bluetooth subsystem;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– Distributed Switch Architecture;
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– IEEE 802.15.4 subsystem;
– Multipath TCP;
– Netfilter;
– Netlink;
– NET/ROM layer;
– Packet sockets;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– Sun RPC protocol;
– TIPC protocol;
– VMware vSockets driver;
– eXpress Data Path;
– SELinux security module;
– ALSA framework;
– USB sound devices;
(CVE-2024-56558, CVE-2024-53227, CVE-2024-53130, CVE-2025-21664,
CVE-2024-53142, CVE-2024-55881, CVE-2024-57906, CVE-2024-46809,
CVE-2024-53198, CVE-2024-53184, CVE-2024-53237, CVE-2024-56770,
CVE-2024-53150, CVE-2024-56700, CVE-2024-50242, CVE-2024-53181,
CVE-2024-56574, CVE-2024-56681, CVE-2024-56678, CVE-2024-53119,
CVE-2024-53129, CVE-2024-56567, CVE-2024-56688, CVE-2024-49925,
CVE-2025-21687, CVE-2024-56643, CVE-2025-21631, CVE-2024-52332,
CVE-2024-53226, CVE-2025-21665, CVE-2024-56615, CVE-2024-57911,
CVE-2024-53136, CVE-2024-56603, CVE-2024-56690, CVE-2024-47730,
CVE-2024-56586, CVE-2024-46784, CVE-2024-56596, CVE-2024-53172,
CVE-2024-57901, CVE-2024-56693, CVE-2024-56605, CVE-2024-57896,
CVE-2024-56698, CVE-2024-56724, CVE-2024-49998, CVE-2024-53239,
CVE-2024-53206, CVE-2024-56636, CVE-2024-56597, CVE-2024-56533,
CVE-2024-42315, CVE-2024-56701, CVE-2024-56587, CVE-2024-57791,
CVE-2024-56619, CVE-2024-50051, CVE-2024-56569, CVE-2025-21694,
CVE-2025-21699, CVE-2024-53214, CVE-2024-57904, CVE-2024-49571,
CVE-2024-56754, CVE-2024-56572, CVE-2024-49974, CVE-2024-53140,
CVE-2025-21639, CVE-2024-56369, CVE-2024-56601, CVE-2024-56642,
CVE-2024-57792, CVE-2024-57838, CVE-2024-53127, CVE-2025-21690,
CVE-2024-56548, CVE-2024-53155, CVE-2024-47143, CVE-2024-56691,
CVE-2024-57938, CVE-2025-21692, CVE-2024-56648, CVE-2024-46841,
CVE-2024-57807, CVE-2024-57908, CVE-2024-50121, CVE-2024-57841,
CVE-2024-53135, CVE-2024-53180, CVE-2025-21683, CVE-2024-56568,
CVE-2024-56575, CVE-2024-56774, CVE-2024-56589, CVE-2024-36899,
CVE-2024-57889, CVE-2024-50275, CVE-2024-56606, CVE-2024-56578,
CVE-2024-56726, CVE-2024-36476, CVE-2024-53122, CVE-2024-56594,
CVE-2024-56562, CVE-2024-53690, CVE-2024-56769, CVE-2024-57910,
CVE-2024-56720, CVE-2024-56581, CVE-2024-56723, CVE-2025-21669,
CVE-2024-56627, CVE-2024-57925, CVE-2024-56600, CVE-2024-56631,
CVE-2024-56595, CVE-2024-53685, CVE-2024-53157, CVE-2024-57931,
CVE-2024-56644, CVE-2024-53215, CVE-2024-57897, CVE-2024-56748,
CVE-2024-53138, CVE-2025-21646, CVE-2024-47707, CVE-2024-56781,
CVE-2024-57922, CVE-2024-53197, CVE-2024-56777, CVE-2024-56625,
CVE-2024-56650, CVE-2024-56704, CVE-2025-21638, CVE-2024-56623,
CVE-2024-57890, CVE-2024-56630, CVE-2024-53680, CVE-2025-21637,
CVE-2024-56539, CVE-2024-56532, CVE-2024-53217, CVE-2024-53120,
CVE-2024-56780, CVE-2022-49034, CVE-2024-43098, CVE-2024-56590,
CVE-2024-50283, CVE-2024-57917, CVE-2024-56776, CVE-2024-53151,
CVE-2024-49950, CVE-2024-57850, CVE-2024-44938, CVE-2024-47408,
CVE-2024-56778, CVE-2024-56779, CVE-2024-56637, CVE-2024-56640,
CVE-2024-57907, CVE-2024-57940, CVE-2025-21697, CVE-2024-57946,
CVE-2024-53156, CVE-2024-56759, CVE-2024-53146, CVE-2024-56610,
CVE-2024-56670, CVE-2024-57912, CVE-2024-57874, CVE-2024-57884,
CVE-2024-56745, CVE-2024-56715, CVE-2024-56746, CVE-2024-53112,
CVE-2024-53145, CVE-2024-56614, CVE-2024-53174, CVE-2024-57849,
CVE-2024-56767, CVE-2024-53173, CVE-2025-21689, CVE-2024-56739,
CVE-2024-56694, CVE-2024-57939, CVE-2024-56622, CVE-2024-56570,
CVE-2024-56634, CVE-2024-53161, CVE-2024-53121, CVE-2024-56705,
CVE-2024-56756, CVE-2024-53183, CVE-2024-56629, CVE-2025-21636,
CVE-2024-56763, CVE-2024-56593, CVE-2025-21640, CVE-2024-53148,
CVE-2025-21678, CVE-2024-56602, CVE-2024-57882, CVE-2024-56576,
CVE-2024-53096, CVE-2024-53165, CVE-2024-57903, CVE-2024-57802,
CVE-2025-21653, CVE-2024-56662, CVE-2024-56626, CVE-2024-56645,
CVE-2024-48881, CVE-2024-57892, CVE-2024-56531, CVE-2024-56716,
CVE-2024-56787, CVE-2024-57929, CVE-2024-50055, CVE-2024-49996,
CVE-2024-53171, CVE-2025-21648, CVE-2024-57948, CVE-2024-53099,
CVE-2024-56785, CVE-2024-57913, CVE-2024-53131, CVE-2024-53194,
CVE-2024-56659, CVE-2024-55916, CVE-2024-56616, CVE-2024-56728,
CVE-2024-43900, CVE-2025-21680, CVE-2024-53113, CVE-2024-58087,
CVE-2024-56598, CVE-2024-57902, CVE-2024-56679, CVE-2025-21666,
CVE-2024-57951, CVE-2024-56708, CVE-2024-56633, CVE-2024-56747,
CVE-2024-53125, CVE-2024-45828, CVE-2024-53124, CVE-2024-46871,
CVE-2024-57900, CVE-2024-50304, CVE-2024-53158)

Read More

USN-7387-3: Linux kernel (Real-time) vulnerabilities

Read Time:5 Minute, 29 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– SuperH RISC architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Block layer subsystem;
– Cryptographic API;
– ACPI drivers;
– Drivers core;
– RAM backed block device driver;
– Virtio block driver;
– Data acquisition framework and drivers;
– Hardware crypto device drivers;
– DMA engine subsystem;
– EDAC drivers;
– ARM SCPI message protocol;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Multifunction device drivers;
– MMC subsystem;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– Microsoft Azure Network Adapter (MANA) driver;
– NVME drivers;
– PCI subsystem;
– Pin controllers subsystem;
– x86 platform drivers;
– Power supply drivers;
– Real Time Clock drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– i.MX SoC drivers;
– QCOM SoC drivers;
– SPI subsystem;
– Media staging drivers;
– UFS subsystem;
– DesignWare USB3 driver;
– USB Gadget drivers;
– USB Serial drivers;
– USB Type-C Port Controller Manager driver;
– VFIO drivers;
– Framebuffer layer;
– Xen hypervisor drivers;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– GFS2 file system;
– JFFS2 file system;
– JFS file system;
– Network file system (NFS) client;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– NTFS3 file system;
– Overlay file system;
– Proc file system;
– Diskquota system;
– SMB network file system;
– UBI file system;
– Timer subsystem;
– VLANs driver;
– LAPB network protocol;
– Kernel init infrastructure;
– BPF subsystem;
– Kernel CPU control infrastructure;
– DMA mapping infrastructure;
– KCSAN framework;
– Tracing infrastructure;
– Memory management;
– 9P file system network protocol;
– Bluetooth subsystem;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– Distributed Switch Architecture;
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– IEEE 802.15.4 subsystem;
– Multipath TCP;
– Netfilter;
– Netlink;
– NET/ROM layer;
– Packet sockets;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– Sun RPC protocol;
– TIPC protocol;
– VMware vSockets driver;
– eXpress Data Path;
– SELinux security module;
– ALSA framework;
– USB sound devices;
(CVE-2024-56558, CVE-2024-53227, CVE-2024-53130, CVE-2025-21664,
CVE-2024-53142, CVE-2024-55881, CVE-2024-57906, CVE-2024-46809,
CVE-2024-53198, CVE-2024-53184, CVE-2024-53237, CVE-2024-56770,
CVE-2024-53150, CVE-2024-56700, CVE-2024-50242, CVE-2024-53181,
CVE-2024-56574, CVE-2024-56681, CVE-2024-56678, CVE-2024-53119,
CVE-2024-53129, CVE-2024-56567, CVE-2024-56688, CVE-2024-49925,
CVE-2025-21687, CVE-2024-56643, CVE-2025-21631, CVE-2024-52332,
CVE-2024-53226, CVE-2025-21665, CVE-2024-56615, CVE-2024-57911,
CVE-2024-53136, CVE-2024-56603, CVE-2024-56690, CVE-2024-47730,
CVE-2024-56586, CVE-2024-46784, CVE-2024-56596, CVE-2024-53172,
CVE-2024-57901, CVE-2024-56693, CVE-2024-56605, CVE-2024-57896,
CVE-2024-56698, CVE-2024-56724, CVE-2024-49998, CVE-2024-53239,
CVE-2024-53206, CVE-2024-56636, CVE-2024-56597, CVE-2024-56533,
CVE-2024-42315, CVE-2024-56701, CVE-2024-56587, CVE-2024-57791,
CVE-2024-56619, CVE-2024-50051, CVE-2024-56569, CVE-2025-21694,
CVE-2025-21699, CVE-2024-53214, CVE-2024-57904, CVE-2024-49571,
CVE-2024-56754, CVE-2024-56572, CVE-2024-49974, CVE-2024-53140,
CVE-2025-21639, CVE-2024-56369, CVE-2024-56601, CVE-2024-56642,
CVE-2024-57792, CVE-2024-57838, CVE-2024-53127, CVE-2025-21690,
CVE-2024-56548, CVE-2024-53155, CVE-2024-47143, CVE-2024-56691,
CVE-2024-57938, CVE-2025-21692, CVE-2024-56648, CVE-2024-46841,
CVE-2024-57807, CVE-2024-57908, CVE-2024-50121, CVE-2024-57841,
CVE-2024-53135, CVE-2024-53180, CVE-2025-21683, CVE-2024-56568,
CVE-2024-56575, CVE-2024-56774, CVE-2024-56589, CVE-2024-36899,
CVE-2024-57889, CVE-2024-50275, CVE-2024-56606, CVE-2024-56578,
CVE-2024-56726, CVE-2024-36476, CVE-2024-53122, CVE-2024-56594,
CVE-2024-56562, CVE-2024-53690, CVE-2024-56769, CVE-2024-57910,
CVE-2024-56720, CVE-2024-56581, CVE-2024-56723, CVE-2025-21669,
CVE-2024-56627, CVE-2024-57925, CVE-2024-56600, CVE-2024-56631,
CVE-2024-56595, CVE-2024-53685, CVE-2024-53157, CVE-2024-57931,
CVE-2024-56644, CVE-2024-53215, CVE-2024-57897, CVE-2024-56748,
CVE-2024-53138, CVE-2025-21646, CVE-2024-47707, CVE-2024-56781,
CVE-2024-57922, CVE-2024-53197, CVE-2024-56777, CVE-2024-56625,
CVE-2024-56650, CVE-2024-56704, CVE-2025-21638, CVE-2024-56623,
CVE-2024-57890, CVE-2024-56630, CVE-2024-53680, CVE-2025-21637,
CVE-2024-56539, CVE-2024-56532, CVE-2024-53217, CVE-2024-53120,
CVE-2024-56780, CVE-2022-49034, CVE-2024-43098, CVE-2024-56590,
CVE-2024-50283, CVE-2024-57917, CVE-2024-56776, CVE-2024-53151,
CVE-2024-49950, CVE-2024-57850, CVE-2024-44938, CVE-2024-47408,
CVE-2024-56778, CVE-2024-56779, CVE-2024-56637, CVE-2024-56640,
CVE-2024-57907, CVE-2024-57940, CVE-2025-21697, CVE-2024-57946,
CVE-2024-53156, CVE-2024-56759, CVE-2024-53146, CVE-2024-56610,
CVE-2024-56670, CVE-2024-57912, CVE-2024-57874, CVE-2024-57884,
CVE-2024-56745, CVE-2024-56715, CVE-2024-56746, CVE-2024-53112,
CVE-2024-53145, CVE-2024-56614, CVE-2024-53174, CVE-2024-57849,
CVE-2024-56767, CVE-2024-53173, CVE-2025-21689, CVE-2024-56739,
CVE-2024-56694, CVE-2024-57939, CVE-2024-56622, CVE-2024-56570,
CVE-2024-56634, CVE-2024-53161, CVE-2024-53121, CVE-2024-56705,
CVE-2024-56756, CVE-2024-53183, CVE-2024-56629, CVE-2025-21636,
CVE-2024-56763, CVE-2024-56593, CVE-2025-21640, CVE-2024-53148,
CVE-2025-21678, CVE-2024-56602, CVE-2024-57882, CVE-2024-56576,
CVE-2024-53096, CVE-2024-53165, CVE-2024-57903, CVE-2024-57802,
CVE-2025-21653, CVE-2024-56662, CVE-2024-56626, CVE-2024-56645,
CVE-2024-48881, CVE-2024-57892, CVE-2024-56531, CVE-2024-56716,
CVE-2024-56787, CVE-2024-57929, CVE-2024-50055, CVE-2024-49996,
CVE-2024-53171, CVE-2025-21648, CVE-2024-57948, CVE-2024-53099,
CVE-2024-56785, CVE-2024-57913, CVE-2024-53131, CVE-2024-53194,
CVE-2024-56659, CVE-2024-55916, CVE-2024-56616, CVE-2024-56728,
CVE-2024-43900, CVE-2025-21680, CVE-2024-53113, CVE-2024-58087,
CVE-2024-56598, CVE-2024-57902, CVE-2024-56679, CVE-2025-21666,
CVE-2024-57951, CVE-2024-56708, CVE-2024-56633, CVE-2024-56747,
CVE-2024-53125, CVE-2024-45828, CVE-2024-53124, CVE-2024-46871,
CVE-2024-57900, CVE-2024-50304, CVE-2024-53158)

Read More

USN-7390-1: Linux kernel (Xilinx ZynqMP) vulnerabilities

Read Time:7 Minute, 38 Second

Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– MIPS architecture;
– PowerPC architecture;
– RISC-V architecture;
– S390 architecture;
– SuperH RISC architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Block layer subsystem;
– Cryptographic API;
– ACPI drivers;
– Drivers core;
– RAM backed block device driver;
– Virtio block driver;
– Data acquisition framework and drivers;
– Hardware crypto device drivers;
– DMA engine subsystem;
– EDAC drivers;
– ARM SCPI message protocol;
– GPIO subsystem;
– GPU drivers;
– HID subsystem;
– Microsoft Hyper-V drivers;
– I2C subsystem;
– I3C subsystem;
– IIO ADC drivers;
– IIO subsystem;
– InfiniBand drivers;
– IOMMU subsystem;
– IRQ chip drivers;
– LED subsystem;
– Multiple devices driver;
– Media drivers;
– Multifunction device drivers;
– MMC subsystem;
– MTD block device drivers;
– Network drivers;
– Mellanox network drivers;
– Microsoft Azure Network Adapter (MANA) driver;
– STMicroelectronics network drivers;
– NVME drivers;
– Parport drivers;
– PCI subsystem;
– Pin controllers subsystem;
– x86 platform drivers;
– Power supply drivers;
– Real Time Clock drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– i.MX SoC drivers;
– QCOM SoC drivers;
– SPI subsystem;
– Direct Digital Synthesis drivers;
– Media staging drivers;
– TCM subsystem;
– TTY drivers;
– UFS subsystem;
– DesignWare USB3 driver;
– USB Gadget drivers;
– USB Dual Role (OTG-ready) Controller drivers;
– USB Serial drivers;
– USB Type-C support driver;
– USB Type-C Port Controller Manager driver;
– USB Type-C Connector System Software Interface driver;
– VFIO drivers;
– Framebuffer layer;
– Xen hypervisor drivers;
– AFS file system;
– BTRFS file system;
– Ceph distributed file system;
– File systems infrastructure;
– F2FS file system;
– GFS2 file system;
– JFFS2 file system;
– JFS file system;
– Network file system (NFS) client;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– NTFS3 file system;
– Overlay file system;
– Proc file system;
– Diskquota system;
– SMB network file system;
– UBI file system;
– Timer subsystem;
– VLANs driver;
– LAPB network protocol;
– User-space API (UAPI);
– Kernel init infrastructure;
– io_uring subsystem;
– BPF subsystem;
– Kernel CPU control infrastructure;
– DMA mapping infrastructure;
– KCSAN framework;
– Tracing infrastructure;
– Closures library;
– Memory management;
– 9P file system network protocol;
– Amateur Radio drivers;
– Bluetooth subsystem;
– CAN network layer;
– Networking core;
– DCCP (Datagram Congestion Control Protocol);
– Distributed Switch Architecture;
– HSR network protocol;
– IEEE802154.4 network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– IEEE 802.15.4 subsystem;
– Multipath TCP;
– Netfilter;
– Netlink;
– NET/ROM layer;
– Packet sockets;
– Network traffic control;
– SCTP protocol;
– SMC sockets;
– Sun RPC protocol;
– TIPC protocol;
– VMware vSockets driver;
– eXpress Data Path;
– XFRM subsystem;
– Key management;
– SELinux security module;
– ALSA framework;
– FireWire sound drivers;
– HD-audio driver;
– QCOM ASoC drivers;
– STMicroelectronics SoC drivers;
– USB sound devices;
– KVM core;
(CVE-2024-50299, CVE-2024-50304, CVE-2024-50196, CVE-2024-56548,
CVE-2024-56531, CVE-2024-56720, CVE-2024-58087, CVE-2024-50116,
CVE-2024-56590, CVE-2024-56589, CVE-2024-53172, CVE-2025-21687,
CVE-2024-57925, CVE-2024-56640, CVE-2024-57896, CVE-2024-56739,
CVE-2024-56622, CVE-2024-53173, CVE-2024-56610, CVE-2024-56787,
CVE-2025-21690, CVE-2024-50259, CVE-2024-50278, CVE-2024-53685,
CVE-2024-50099, CVE-2024-56616, CVE-2024-53181, CVE-2024-56643,
CVE-2024-49950, CVE-2024-53119, CVE-2024-50257, CVE-2024-56777,
CVE-2024-49998, CVE-2024-56629, CVE-2024-56728, CVE-2024-56601,
CVE-2024-56776, CVE-2024-46809, CVE-2024-53061, CVE-2024-50273,
CVE-2024-45828, CVE-2024-53161, CVE-2024-56700, CVE-2024-50103,
CVE-2024-50156, CVE-2024-53150, CVE-2024-50237, CVE-2024-46841,
CVE-2024-56636, CVE-2024-56572, CVE-2024-50290, CVE-2024-57913,
CVE-2024-56698, CVE-2024-56690, CVE-2024-56568, CVE-2024-57911,
CVE-2024-49974, CVE-2024-47707, CVE-2024-53059, CVE-2024-50244,
CVE-2024-57874, CVE-2024-56539, CVE-2024-53145, CVE-2024-56602,
CVE-2024-50115, CVE-2024-56726, CVE-2024-53157, CVE-2024-41080,
CVE-2024-57938, CVE-2024-56569, CVE-2024-50171, CVE-2024-57807,
CVE-2024-57890, CVE-2024-53122, CVE-2024-56746, CVE-2024-53135,
CVE-2024-53063, CVE-2024-57922, CVE-2024-53130, CVE-2024-53174,
CVE-2024-56774, CVE-2024-56606, CVE-2024-56648, CVE-2024-50160,
CVE-2024-50262, CVE-2024-50163, CVE-2024-53112, CVE-2024-50234,
CVE-2024-56576, CVE-2025-21664, CVE-2024-53113, CVE-2024-56625,
CVE-2024-50154, CVE-2024-56662, CVE-2024-56645, CVE-2024-56778,
CVE-2024-40953, CVE-2024-50055, CVE-2024-40965, CVE-2024-56627,
CVE-2024-43900, CVE-2024-56578, CVE-2024-50202, CVE-2024-56670,
CVE-2024-56705, CVE-2024-53103, CVE-2024-57948, CVE-2024-53197,
CVE-2024-56704, CVE-2024-50101, CVE-2024-53180, CVE-2024-56769,
CVE-2024-53171, CVE-2024-56558, CVE-2024-53042, CVE-2024-50051,
CVE-2024-42291, CVE-2024-39497, CVE-2024-53183, CVE-2024-43098,
CVE-2024-57904, CVE-2024-56615, CVE-2024-50086, CVE-2024-53239,
CVE-2024-50127, CVE-2024-50134, CVE-2024-53148, CVE-2024-47408,
CVE-2024-50279, CVE-2024-50292, CVE-2024-53099, CVE-2024-50121,
CVE-2024-56567, CVE-2024-53146, CVE-2024-53052, CVE-2024-53120,
CVE-2024-56678, CVE-2024-50282, CVE-2024-50249, CVE-2024-56623,
CVE-2024-56701, CVE-2024-56708, CVE-2024-56763, CVE-2024-50209,
CVE-2025-21639, CVE-2024-50230, CVE-2024-53096, CVE-2024-47730,
CVE-2024-42252, CVE-2024-57849, CVE-2024-56587, CVE-2024-56614,
CVE-2024-56369, CVE-2024-57838, CVE-2025-21653, CVE-2024-57792,
CVE-2024-53140, CVE-2024-56780, CVE-2024-50218, CVE-2024-56767,
CVE-2024-49571, CVE-2024-57910, CVE-2024-50269, CVE-2024-56630,
CVE-2024-52332, CVE-2024-56693, CVE-2024-50148, CVE-2025-21648,
CVE-2024-49996, CVE-2024-50085, CVE-2024-56688, CVE-2024-53125,
CVE-2024-53129, CVE-2024-55916, CVE-2024-57900, CVE-2024-57903,
CVE-2024-57939, CVE-2024-50010, CVE-2024-50265, CVE-2023-52913,
CVE-2024-36476, CVE-2024-56574, CVE-2025-21636, CVE-2024-57912,
CVE-2024-56642, CVE-2024-50287, CVE-2024-36899, CVE-2024-53131,
CVE-2024-56595, CVE-2024-53058, CVE-2024-46871, CVE-2024-56586,
CVE-2024-53198, CVE-2025-21699, CVE-2024-50082, CVE-2024-53194,
CVE-2024-57901, CVE-2024-50199, CVE-2024-57802, CVE-2024-53138,
CVE-2024-53124, CVE-2024-50167, CVE-2024-56597, CVE-2024-50233,
CVE-2024-49925, CVE-2024-56781, CVE-2024-53127, CVE-2025-21680,
CVE-2024-53165, CVE-2024-53227, CVE-2024-56672, CVE-2024-55881,
CVE-2024-53184, CVE-2024-50198, CVE-2024-42315, CVE-2024-57931,
CVE-2024-56694, CVE-2024-57951, CVE-2024-56659, CVE-2024-50247,
CVE-2024-53690, CVE-2024-56650, CVE-2024-57889, CVE-2024-53097,
CVE-2024-50072, CVE-2024-50267, CVE-2024-53066, CVE-2024-50153,
CVE-2024-50194, CVE-2024-56681, CVE-2025-21692, CVE-2024-50131,
CVE-2024-57884, CVE-2024-56748, CVE-2024-48881, CVE-2024-56593,
CVE-2024-50162, CVE-2024-44938, CVE-2024-50128, CVE-2024-50275,
CVE-2025-21638, CVE-2024-56634, CVE-2024-56679, CVE-2024-47143,
CVE-2024-50251, CVE-2024-56570, CVE-2024-53156, CVE-2024-50205,
CVE-2024-56747, CVE-2024-53121, CVE-2024-50208, CVE-2024-57841,
CVE-2024-56575, CVE-2024-57791, CVE-2024-57897, CVE-2024-56626,
CVE-2024-35887, CVE-2024-50302, CVE-2024-50242, CVE-2024-56756,
CVE-2024-53217, CVE-2025-21669, CVE-2024-56603, CVE-2024-56785,
CVE-2024-57917, CVE-2024-50058, CVE-2024-57902, CVE-2024-53215,
CVE-2024-50229, CVE-2024-50295, CVE-2024-56633, CVE-2024-50151,
CVE-2024-53214, CVE-2024-50232, CVE-2024-53158, CVE-2024-56715,
CVE-2024-50182, CVE-2025-21631, CVE-2024-53104, CVE-2024-53101,
CVE-2024-57908, CVE-2024-53055, CVE-2024-50143, CVE-2025-21646,
CVE-2024-56605, CVE-2025-21640, CVE-2024-56779, CVE-2024-50296,
CVE-2024-50201, CVE-2024-56691, CVE-2024-57882, CVE-2024-53141,
CVE-2024-56600, CVE-2025-21689, CVE-2024-26718, CVE-2024-56596,
CVE-2024-53151, CVE-2024-50083, CVE-2024-50283, CVE-2024-56532,
CVE-2024-53226, CVE-2024-56637, CVE-2024-50193, CVE-2024-56644,
CVE-2025-21637, CVE-2024-56716, CVE-2024-53680, CVE-2024-57907,
CVE-2022-49034, CVE-2024-50150, CVE-2024-56723, CVE-2025-21665,
CVE-2024-56759, CVE-2024-50301, CVE-2024-57929, CVE-2024-53164,
CVE-2024-56754, CVE-2024-53237, CVE-2025-21694, CVE-2024-56770,
CVE-2024-50141, CVE-2024-50192, CVE-2024-56581, CVE-2024-57892,
CVE-2024-53142, CVE-2024-50268, CVE-2024-53088, CVE-2025-21683,
CVE-2024-56724, CVE-2024-41066, CVE-2024-46784, CVE-2024-50074,
CVE-2024-57906, CVE-2024-57850, CVE-2024-50036, CVE-2024-57946,
CVE-2024-50117, CVE-2024-56594, CVE-2024-56619, CVE-2024-56598,
CVE-2024-56533, CVE-2024-56562, CVE-2024-57940, CVE-2024-56745,
CVE-2024-53155, CVE-2024-50236, CVE-2025-21666, CVE-2025-21697,
CVE-2024-50185, CVE-2024-56631, CVE-2024-50195, CVE-2024-50245,
CVE-2024-50110, CVE-2025-21678, CVE-2024-50142)

Read More