Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– Drivers core;
– HID subsystem;
– Network drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– File systems infrastructure;
– Ext4 file system;
– JFS file system;
– Network file system (NFS) client;
– Memory management;
– Network namespace;
– CAIF protocol;
– Networking core;
– HSR network protocol;
– IPv4 networking;
– IPv6 networking;
– MAC80211 subsystem;
– Network traffic control;
(CVE-2025-21702, CVE-2024-53227, CVE-2024-46826, CVE-2024-49952,
CVE-2024-56600, CVE-2021-47235, CVE-2024-50265, CVE-2021-47119,
CVE-2024-53165, CVE-2021-47483, CVE-2024-50302, CVE-2024-56595,
CVE-2024-50167, CVE-2024-56658, CVE-2024-49948, CVE-2024-26921,
CVE-2021-47602, CVE-2024-26863, CVE-2021-47320, CVE-2025-21700,
CVE-2021-47122)
Category Archives: Advisories
USN-7428-2: Linux kernel (FIPS) vulnerabilities
Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23041)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– HID subsystem;
– Network drivers;
– Mellanox network drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– File systems infrastructure;
– Ext4 file system;
– JFS file system;
– IP tunnels definitions;
– Network namespace;
– BPF subsystem;
– Networking core;
– HSR network protocol;
– IPv4 networking;
– IPv6 networking;
– Network traffic control;
(CVE-2024-56615, CVE-2024-56600, CVE-2025-21700, CVE-2024-56658,
CVE-2024-35960, CVE-2024-50265, CVE-2025-21702, CVE-2024-53227,
CVE-2024-53165, CVE-2024-50167, CVE-2024-26863, CVE-2024-35973,
CVE-2024-46826, CVE-2021-47119, CVE-2024-50302, CVE-2024-49952,
CVE-2021-47101, CVE-2024-49948, CVE-2024-56595)
USN-7428-1: Linux kernel vulnerabilities
Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23041)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– HID subsystem;
– Network drivers;
– Mellanox network drivers;
– SCSI subsystem;
– SuperH / SH-Mobile drivers;
– File systems infrastructure;
– Ext4 file system;
– JFS file system;
– IP tunnels definitions;
– Network namespace;
– BPF subsystem;
– Networking core;
– HSR network protocol;
– IPv4 networking;
– IPv6 networking;
– Network traffic control;
(CVE-2024-56615, CVE-2024-56600, CVE-2025-21700, CVE-2024-56658,
CVE-2024-35960, CVE-2024-50265, CVE-2025-21702, CVE-2024-53227,
CVE-2024-53165, CVE-2024-50167, CVE-2024-26863, CVE-2024-35973,
CVE-2024-46826, CVE-2021-47119, CVE-2024-50302, CVE-2024-49952,
CVE-2021-47101, CVE-2024-49948, CVE-2024-56595)
zabbix-6.0.39-1.el9
FEDORA-EPEL-2025-c997801cc7
Packages in this update:
zabbix-6.0.39-1.el9
Update description:
Update to 6.0.39
perl-String-Compare-ConstantTime-0.321-19.fc40
FEDORA-2025-e6f5710dba
Packages in this update:
perl-String-Compare-ConstantTime-0.321-19.fc40
Update description:
This release fixes CVE-2024-13939 (leaking the length of a secret string)
perl-String-Compare-ConstantTime-0.321-21.fc41
FEDORA-2025-5d61874568
Packages in this update:
perl-String-Compare-ConstantTime-0.321-21.fc41
Update description:
This release fixes CVE-2024-13939 (leaking the length of a secret string)
perl-String-Compare-ConstantTime-0.321-22.fc42
FEDORA-2025-ce51c124a5
Packages in this update:
perl-String-Compare-ConstantTime-0.321-22.fc42
Update description:
This release fixes CVE-2024-13939 (leaking the length of a secret string)
uboot-tools-2025.04-1.fc42
FEDORA-2025-a3561bfc13
Packages in this update:
uboot-tools-2025.04-1.fc42
Update description:
Update to 2025.04 GA
Update to 2025.04 RC5
ZDI-25-225: (Pwn2Own) Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-1050.
ZDI-25-224: (Pwn2Own) Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-1049.