Michael Randrianantenaina discovered that the Bluetooth driver in the Linux
Kernel contained an improper access control vulnerability. A nearby
attacker could use this to connect a rougue device and possibly execute
arbitrary code. (CVE-2024-8805)
Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM32 architecture;
– ARM64 architecture;
– x86 architecture;
– Block layer subsystem;
– Cryptographic API;
– ACPI drivers;
– Drivers core;
– ATA over ethernet (AOE) driver;
– Network block device driver;
– Ublk userspace block driver;
– Compressed RAM block device driver;
– TPM device driver;
– CPU frequency scaling framework;
– Hardware crypto device drivers;
– DAX dirext access to differentiated memory framework;
– ARM SCMI message protocol;
– EFI core;
– GPU drivers;
– HID subsystem;
– I2C subsystem;
– I3C subsystem;
– IIO subsystem;
– InfiniBand drivers;
– Input Device core drivers;
– IOMMU subsystem;
– IRQ chip drivers;
– Mailbox framework;
– Media drivers;
– Ethernet bonding driver;
– Network drivers;
– Mellanox network drivers;
– STMicroelectronics network drivers;
– NTB driver;
– Virtio pmem driver;
– Parport drivers;
– PCI subsystem;
– Alibaba DDR Sub-System Driveway PMU driver;
– Pin controllers subsystem;
– x86 platform drivers;
– Powercap sysfs driver;
– Remote Processor subsystem;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– Direct Digital Synthesis drivers;
– Thermal drivers;
– TTY drivers;
– UFS subsystem;
– USB Device Class drivers;
– USB Gadget drivers;
– USB Host Controller drivers;
– TI TPS6598x USB Power Delivery controller driver;
– vDPA drivers;
– Virtio Host (VHOST) subsystem;
– Framebuffer layer;
– AFS file system;
– BTRFS file system;
– File systems infrastructure;
– Ceph distributed file system;
– Ext4 file system;
– F2FS file system;
– JFS file system;
– Network file systems library;
– Network file system (NFS) client;
– Network file system (NFS) server daemon;
– NILFS2 file system;
– NTFS3 file system;
– SMB network file system;
– BPF subsystem;
– Network file system (NFS) superblock;
– Virtio network driver;
– Network traffic control;
– Network sockets;
– TCP network protocol;
– User-space API (UAPI);
– io_uring subsystem;
– Perf events;
– Kernel thread helper (kthread);
– Padata parallel execution mechanism;
– RCU subsystem;
– Arbitrary resource management;
– Static call mechanism;
– Timer subsystem;
– Tracing infrastructure;
– Maple Tree data structure library;
– Memory management;
– Bluetooth subsystem;
– Ethernet bridge;
– CAN network layer;
– Networking core;
– Distributed Switch Architecture;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– IEEE 802.15.4 subsystem;
– Multipath TCP;
– NCSI (Network Controller Sideband Interface) driver;
– Netfilter;
– Netlink;
– RxRPC session sockets;
– SCTP protocol;
– TIPC protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– AudioScience HPI driver;
– KVM core;
(CVE-2024-49952, CVE-2024-49920, CVE-2024-49945, CVE-2024-50180,
CVE-2024-49944, CVE-2024-49987, CVE-2024-50148, CVE-2024-49959,
CVE-2024-50063, CVE-2024-50083, CVE-2024-49878, CVE-2024-49870,
CVE-2024-49863, CVE-2024-49921, CVE-2024-49992, CVE-2024-47691,
CVE-2024-49913, CVE-2024-47712, CVE-2024-49948, CVE-2024-49976,
CVE-2024-50085, CVE-2024-49891, CVE-2024-56614, CVE-2024-47713,
CVE-2024-47703, CVE-2024-50191, CVE-2024-50087, CVE-2024-49958,
CVE-2024-49868, CVE-2024-49922, CVE-2024-49960, CVE-2024-50019,
CVE-2024-47749, CVE-2024-49996, CVE-2024-47677, CVE-2024-50065,
CVE-2024-47744, CVE-2024-49968, CVE-2024-49985, CVE-2024-47752,
CVE-2024-50017, CVE-2024-50183, CVE-2024-47709, CVE-2024-49938,
CVE-2024-49876, CVE-2024-49893, CVE-2024-50134, CVE-2024-49972,
CVE-2024-49934, CVE-2024-50015, CVE-2024-49856, CVE-2024-49853,
CVE-2024-47711, CVE-2024-49949, CVE-2024-50026, CVE-2024-47681,
CVE-2024-50000, CVE-2024-50189, CVE-2024-47716, CVE-2024-47723,
CVE-2024-50044, CVE-2024-50179, CVE-2024-49871, CVE-2024-50008,
CVE-2024-49955, CVE-2024-50007, CVE-2024-47695, CVE-2024-49889,
CVE-2024-49954, CVE-2024-49894, CVE-2024-50014, CVE-2024-47731,
CVE-2024-50055, CVE-2024-50098, CVE-2024-49930, CVE-2024-47684,
CVE-2024-47705, CVE-2024-50029, CVE-2024-49901, CVE-2024-47689,
CVE-2024-50022, CVE-2024-50009, CVE-2024-49937, CVE-2024-50197,
CVE-2024-49911, CVE-2024-50076, CVE-2024-50002, CVE-2024-50077,
CVE-2024-47679, CVE-2024-50025, CVE-2024-50069, CVE-2024-50101,
CVE-2024-49942, CVE-2024-49986, CVE-2024-50012, CVE-2024-49858,
CVE-2024-49884, CVE-2024-50201, CVE-2024-47701, CVE-2024-49994,
CVE-2024-49897, CVE-2024-47687, CVE-2024-47751, CVE-2024-50001,
CVE-2024-50117, CVE-2024-49909, CVE-2024-50086, CVE-2024-50064,
CVE-2024-50088, CVE-2024-50005, CVE-2024-50184, CVE-2024-49882,
CVE-2024-49936, CVE-2024-49933, CVE-2024-49995, CVE-2024-47704,
CVE-2024-50066, CVE-2024-49898, CVE-2024-50068, CVE-2024-50192,
CVE-2024-53104, CVE-2024-49860, CVE-2024-47741, CVE-2024-50039,
CVE-2024-47699, CVE-2024-49861, CVE-2024-49969, CVE-2024-49950,
CVE-2024-50194, CVE-2024-49929, CVE-2024-50006, CVE-2024-49997,
CVE-2024-49983, CVE-2024-47710, CVE-2024-50200, CVE-2024-47692,
CVE-2024-47748, CVE-2024-49855, CVE-2024-50182, CVE-2024-47706,
CVE-2024-50188, CVE-2024-47732, CVE-2024-47707, CVE-2024-50048,
CVE-2024-50058, CVE-2024-49912, CVE-2024-49966, CVE-2024-49852,
CVE-2024-47753, CVE-2024-50202, CVE-2024-50062, CVE-2024-50056,
CVE-2024-49946, CVE-2024-49902, CVE-2024-50033, CVE-2024-47750,
CVE-2024-50021, CVE-2024-49939, CVE-2024-50072, CVE-2024-49851,
CVE-2024-49928, CVE-2024-50061, CVE-2024-49885, CVE-2024-50047,
CVE-2024-47672, CVE-2024-47734, CVE-2024-47714, CVE-2024-49886,
CVE-2024-47730, CVE-2024-47697, CVE-2024-49973, CVE-2024-47718,
CVE-2024-49862, CVE-2024-49963, CVE-2024-49881, CVE-2024-53165,
CVE-2024-49998, CVE-2024-47757, CVE-2024-49982, CVE-2024-50186,
CVE-2024-50016, CVE-2024-47675, CVE-2024-50090, CVE-2024-49917,
CVE-2024-50031, CVE-2024-50093, CVE-2024-49859, CVE-2024-49890,
CVE-2024-47670, CVE-2024-49919, CVE-2024-53156, CVE-2024-49924,
CVE-2024-50078, CVE-2024-49864, CVE-2024-49962, CVE-2024-47720,
CVE-2024-49874, CVE-2024-41016, CVE-2024-49991, CVE-2024-47726,
CVE-2024-50171, CVE-2024-47682, CVE-2024-49865, CVE-2024-49988,
CVE-2024-49903, CVE-2024-50035, CVE-2024-50229, CVE-2024-50075,
CVE-2024-50195, CVE-2024-49947, CVE-2024-49900, CVE-2024-50040,
CVE-2024-50176, CVE-2024-47686, CVE-2024-49978, CVE-2024-49923,
CVE-2024-50199, CVE-2024-49999, CVE-2024-50070, CVE-2024-49953,
CVE-2024-47733, CVE-2024-49888, CVE-2024-49977, CVE-2024-50080,
CVE-2024-49905, CVE-2024-47737, CVE-2024-49961, CVE-2024-50030,
CVE-2024-49951, CVE-2024-49892, CVE-2024-50096, CVE-2024-47735,
CVE-2024-47673, CVE-2024-56663, CVE-2024-49981, CVE-2024-50049,
CVE-2024-50193, CVE-2024-49957, CVE-2024-47742, CVE-2024-49880,
CVE-2024-49965, CVE-2024-49927, CVE-2024-47690, CVE-2024-50057,
CVE-2024-50073, CVE-2024-49931, CVE-2024-49875, CVE-2024-50041,
CVE-2024-47700, CVE-2024-47719, CVE-2024-56582, CVE-2024-47738,
CVE-2024-47754, CVE-2024-49850, CVE-2024-47678, CVE-2024-49935,
CVE-2024-47739, CVE-2024-50028, CVE-2024-47727, CVE-2024-47728,
CVE-2024-50084, CVE-2024-50095, CVE-2024-50175, CVE-2024-50198,
CVE-2024-47702, CVE-2024-50187, CVE-2024-50032, CVE-2024-50074,
CVE-2024-50020, CVE-2024-53144, CVE-2024-50233, CVE-2024-47698,
CVE-2024-49879, CVE-2024-49896, CVE-2024-47747, CVE-2024-49877,
CVE-2024-50046, CVE-2024-49866, CVE-2024-47740, CVE-2024-50042,
CVE-2024-50060, CVE-2024-49925, CVE-2024-50013, CVE-2024-49867,
CVE-2024-47685, CVE-2024-47743, CVE-2024-49883, CVE-2024-53170,
CVE-2024-50038, CVE-2024-47756, CVE-2024-47696, CVE-2024-49980,
CVE-2024-50185, CVE-2024-47693, CVE-2024-49915, CVE-2024-49914,
CVE-2024-49907, CVE-2024-49989, CVE-2024-50196, CVE-2024-50027,
CVE-2024-47745, CVE-2024-50045, CVE-2024-50024, CVE-2024-49918,
CVE-2024-49975, CVE-2024-49974, CVE-2024-50082, CVE-2024-49895,
CVE-2024-47671, CVE-2024-50059, CVE-2024-50099, CVE-2024-50023,
CVE-2024-47688, CVE-2024-49926, CVE-2024-50036)
More Stories
Kubernetes Ingress-nginx Controller RCE
What is the Vulnerability?On March 24, researchers disclosed a set of five vulnerabilities, collectively known as "IngressNightmare,” affecting Ingress-nginx, one...
perl-Compress-Raw-Lzma-2.212-6.fc41 xz-5.8.1-1.fc41.1
FEDORA-2025-051becf4f2 Packages in this update: perl-Compress-Raw-Lzma-2.212-6.fc41 xz-5.8.1-1.fc41.1 Update description: xz 5.8.1 Read More
perl-Compress-Raw-Lzma-2.209-9.fc40 xz-5.8.1-1.1.fc40
FEDORA-2025-4871b31998 Packages in this update: perl-Compress-Raw-Lzma-2.209-9.fc40 xz-5.8.1-1.1.fc40 Update description: xz 5.8.1 Read More
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. ...
A Vulnerability in Ivanti Products Could Allow for Remote Code Execution
A Vulnerability has been discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways which could allow for remote code...
xz-5.8.1-1.fc40
FEDORA-2025-258ab1c008 Packages in this update: xz-5.8.1-1.fc40 Update description: New upstream version 5.8.1 Read More