cve
stringlengths 13
16
| cwe
stringclasses 484
values | affected_component
stringlengths 0
177
| summary
stringlengths 0
227
| severity
stringclasses 5
values | cvss_v2
stringclasses 250
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 30
4k
| statement
stringlengths 1
3.47k
⌀ | discovery_date
stringdate 2001-01-05 00:00:00
2025-05-09 00:00:00
| release_date
stringdate 1999-01-01 00:00:00
2025-05-09 00:00:00
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
599
| known_not_affected_products
sequencelengths 0
30.2k
| under_investigation_products
sequencelengths 0
78
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
218
| remediation_details
sequencelengths 0
218
| remediation_dates
sequencelengths 0
218
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2025-21645 | CWE-20 | kernel | platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it | Low | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it
Wakeup for IRQ1 should be disabled only in cases where i8042 had
actually enabled it, otherwise "wake_depth" for this IRQ will try to
drop below zero and there will be an unpleasant WARN() logged:
kernel: atkbd serio0: Disabling IRQ1 wakeup source to avoid platform firmware bug
kernel: ------------[ cut here ]------------
kernel: Unbalanced IRQ 1 wake disable
kernel: WARNING: CPU: 10 PID: 6431 at kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0
The PMC driver uses DEFINE_SIMPLE_DEV_PM_OPS() to define its dev_pm_ops
which sets amd_pmc_suspend_handler() to the .suspend, .freeze, and
.poweroff handlers. i8042_pm_suspend(), however, is only set as
the .suspend handler.
Fix the issue by call PMC suspend handler only from the same set of
dev_pm_ops handlers as i8042_pm_suspend(), which currently means just
the .suspend handler.
To reproduce this issue try hibernating (S4) the machine after a fresh boot
without putting it into s2idle first.
[ij: edited the commit message.] | null | 2025-01-19T00:00:00+00:00 | 2025-01-19T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2025-37791 | null | kernel | ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll()
rpl is passed as a pointer to ethtool_cmis_module_poll(), so the correct
size of rpl is sizeof(*rpl) which should be just 1 byte. Using the
pointer size instead can cause stack corruption:
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: ethtool_cmis_wait_for_cond+0xf4/0x100
CPU: 72 UID: 0 PID: 4440 Comm: kworker/72:2 Kdump: loaded Tainted: G OE 6.11.0 #24
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Dell Inc. PowerEdge R760/04GWWM, BIOS 1.6.6 09/20/2023
Workqueue: events module_flash_fw_work
Call Trace:
<TASK>
panic+0x339/0x360
? ethtool_cmis_wait_for_cond+0xf4/0x100
? __pfx_status_success+0x10/0x10
? __pfx_status_fail+0x10/0x10
__stack_chk_fail+0x10/0x10
ethtool_cmis_wait_for_cond+0xf4/0x100
ethtool_cmis_cdb_execute_cmd+0x1fc/0x330
? __pfx_status_fail+0x10/0x10
cmis_cdb_module_features_get+0x6d/0xd0
ethtool_cmis_cdb_init+0x8a/0xd0
ethtool_cmis_fw_update+0x46/0x1d0
module_flash_fw_work+0x17/0xa0
process_one_work+0x179/0x390
worker_thread+0x239/0x340
? __pfx_worker_thread+0x10/0x10
kthread+0xcc/0x100
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2d/0x50
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK> | null | 2025-05-01T00:00:00+00:00 | 2025-05-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2025-1816 | CWE-404 | FFmpeg | FFmpeg IAMF File iamf_parse.c audio_element_obu memory leak | Moderate | null | 4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L | A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-03-02T15:00:41.284277+00:00 | 2025-03-02T14:00:07.515000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-21700 | CWE-416 | kernel | net: sched: Disallow replacing of child qdisc from one parent to another | Moderate | null | 6.7/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: sched: Disallow replacing of child qdisc from one parent to another
Lion Ackermann was able to create a UAF which can be abused for privilege
escalation with the following script
Step 1. create root qdisc
tc qdisc add dev lo root handle 1:0 drr
step2. a class for packet aggregation do demonstrate uaf
tc class add dev lo classid 1:1 drr
step3. a class for nesting
tc class add dev lo classid 1:2 drr
step4. a class to graft qdisc to
tc class add dev lo classid 1:3 drr
step5.
tc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024
step6.
tc qdisc add dev lo parent 1:2 handle 3:0 drr
step7.
tc class add dev lo classid 3:1 drr
step 8.
tc qdisc add dev lo parent 3:1 handle 4:0 pfifo
step 9. Display the class/qdisc layout
tc class ls dev lo
class drr 1:1 root leaf 2: quantum 64Kb
class drr 1:2 root leaf 3: quantum 64Kb
class drr 3:1 root leaf 4: quantum 64Kb
tc qdisc ls
qdisc drr 1: dev lo root refcnt 2
qdisc plug 2: dev lo parent 1:1
qdisc pfifo 4: dev lo parent 3:1 limit 1000p
qdisc drr 3: dev lo parent 1:2
step10. trigger the bug <=== prevented by this patch
tc qdisc replace dev lo parent 1:3 handle 4:0
step 11. Redisplay again the qdiscs/classes
tc class ls dev lo
class drr 1:1 root leaf 2: quantum 64Kb
class drr 1:2 root leaf 3: quantum 64Kb
class drr 1:3 root leaf 4: quantum 64Kb
class drr 3:1 root leaf 4: quantum 64Kb
tc qdisc ls
qdisc drr 1: dev lo root refcnt 2
qdisc plug 2: dev lo parent 1:1
qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p
qdisc drr 3: dev lo parent 1:2
Observe that a) parent for 4:0 does not change despite the replace request.
There can only be one parent. b) refcount has gone up by two for 4:0 and
c) both class 1:3 and 3:1 are pointing to it.
Step 12. send one packet to plug
echo "" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))
step13. send one packet to the grafted fifo
echo "" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))
step14. lets trigger the uaf
tc class delete dev lo classid 1:3
tc class delete dev lo classid 1:1
The semantics of "replace" is for a del/add _on the same node_ and not
a delete from one node(3:1) and add to another node (1:3) as in step10.
While we could "fix" with a more complex approach there could be
consequences to expectations so the patch takes the preventive approach of
"disallow such config".
Joint work with Lion Ackermann <[email protected]> | The attack requires some operations that available only for privileged user (ex. "tc qdisc replace dev lo parent 1:3 handle 4:0"), so rated Moderate. | 2025-02-13T00:00:00+00:00 | 2025-02-13T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt"
] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"no_fix_planned",
"no_fix_planned"
] | [
"Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Out of support scope",
"Will not fix"
] | [
null,
null,
null
] |
CVE-2025-22086 | null | kernel | RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
When cur_qp isn't NULL, in order to avoid fetching the QP from
the radix tree again we check if the next cqe QP is identical to
the one we already have.
The bug however is that we are checking if the QP is identical by
checking the QP number inside the CQE against the QP number inside the
mlx5_ib_qp, but that's wrong since the QP number from the CQE is from
FW so it should be matched against mlx5_core_qp which is our FW QP
number.
Otherwise we could use the wrong QP when handling a CQE which could
cause the kernel trace below.
This issue is mainly noticeable over QPs 0 & 1, since for now they are
the only QPs in our driver whereas the QP number inside mlx5_ib_qp
doesn't match the QP number inside mlx5_core_qp.
BUG: kernel NULL pointer dereference, address: 0000000000000012
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP
CPU: 0 UID: 0 PID: 7927 Comm: kworker/u62:1 Not tainted 6.14.0-rc3+ #189
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core]
RIP: 0010:mlx5_ib_poll_cq+0x4c7/0xd90 [mlx5_ib]
Code: 03 00 00 8d 58 ff 21 cb 66 39 d3 74 39 48 c7 c7 3c 89 6e a0 0f b7 db e8 b7 d2 b3 e0 49 8b 86 60 03 00 00 48 c7 c7 4a 89 6e a0 <0f> b7 5c 98 02 e8 9f d2 b3 e0 41 0f b7 86 78 03 00 00 83 e8 01 21
RSP: 0018:ffff88810511bd60 EFLAGS: 00010046
RAX: 0000000000000010 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff88885fa1b3c0 RDI: ffffffffa06e894a
RBP: 00000000000000b0 R08: 0000000000000000 R09: ffff88810511bc10
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88810d593000
R13: ffff88810e579108 R14: ffff888105146000 R15: 00000000000000b0
FS: 0000000000000000(0000) GS:ffff88885fa00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000012 CR3: 00000001077e6001 CR4: 0000000000370eb0
Call Trace:
<TASK>
? __die+0x20/0x60
? page_fault_oops+0x150/0x3e0
? exc_page_fault+0x74/0x130
? asm_exc_page_fault+0x22/0x30
? mlx5_ib_poll_cq+0x4c7/0xd90 [mlx5_ib]
__ib_process_cq+0x5a/0x150 [ib_core]
ib_cq_poll_work+0x31/0x90 [ib_core]
process_one_work+0x169/0x320
worker_thread+0x288/0x3a0
? work_busy+0xb0/0xb0
kthread+0xd7/0x1f0
? kthreads_online_cpu+0x130/0x130
? kthreads_online_cpu+0x130/0x130
ret_from_fork+0x2d/0x50
? kthreads_online_cpu+0x130/0x130
ret_from_fork_asm+0x11/0x20
</TASK> | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-1050 | null | Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability | null | null | null | Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processing of HLS playlist data. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25606. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-02-04T21:26:36.595000+00:00 | 2025-04-09T20:30:08.837000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-4086 | CWE-451 | firefox | thunderbird: Specially crafted filename could be used to obscure download type | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N | A flaw was found in Firefox. The Mozilla Foundation's Security Advisory describes the following issue: A specially crafted filename containing a large number of encoded newline characters could obscure the file's extension when displayed in the download dialog. This bug only affects Firefox for Android. Other versions of Firefox are unaffected. | Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory. | 2025-04-29T14:01:22.584731+00:00 | 2025-04-29T13:13:40.899000+00:00 | [] | [
"red_hat_enterprise_linux_6:firefox",
"red_hat_enterprise_linux_6:thunderbird",
"red_hat_enterprise_linux_7:thunderbird"
] | [
"red_hat_enterprise_linux_7:firefox",
"red_hat_enterprise_linux_8:firefox",
"red_hat_enterprise_linux_8:thunderbird",
"red_hat_enterprise_linux_9:firefox",
"red_hat_enterprise_linux_9:firefox-flatpak-container",
"red_hat_enterprise_linux_9:thunderbird",
"red_hat_enterprise_linux_9:thunderbird-flatpak-container"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2025-21887 | null | kernel | ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
The issue was caused by dput(upper) being called before
ovl_dentry_update_reval(), while upper->d_flags was still
accessed in ovl_dentry_remote().
Move dput(upper) after its last use to prevent use-after-free.
BUG: KASAN: slab-use-after-free in ovl_dentry_remote fs/overlayfs/util.c:162 [inline]
BUG: KASAN: slab-use-after-free in ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
print_address_description mm/kasan/report.c:377 [inline]
print_report+0xc3/0x620 mm/kasan/report.c:488
kasan_report+0xd9/0x110 mm/kasan/report.c:601
ovl_dentry_remote fs/overlayfs/util.c:162 [inline]
ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167
ovl_link_up fs/overlayfs/copy_up.c:610 [inline]
ovl_copy_up_one+0x2105/0x3490 fs/overlayfs/copy_up.c:1170
ovl_copy_up_flags+0x18d/0x200 fs/overlayfs/copy_up.c:1223
ovl_rename+0x39e/0x18c0 fs/overlayfs/dir.c:1136
vfs_rename+0xf84/0x20a0 fs/namei.c:4893
...
</TASK> | null | 2025-03-27T00:00:00+00:00 | 2025-03-27T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-23013 | CWE-394 | pam-u2f | Partial Authentication Bypass in pam-u2f Software Package | Important | null | 6.5/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H | In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-01-15T04:00:47.342457+00:00 | 2025-01-15T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2025-2017 | null | Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability | null | null | null | Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25240. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-03-05T23:40:13.094000+00:00 | 2025-03-10T22:01:25.485000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-21491 | CWE-404 | mysql | MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability | Moderate | null | 5.9/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols. | null | 2025-01-21T21:03:32.601275+00:00 | 2025-01-21T20:52:52.647000+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
] | [] | [
"red_hat_enterprise_linux_6:mysql"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258"
] | [
"2025-02-19T11:10:11+00:00",
"2025-02-19T10:31:41+00:00"
] |
CVE-2025-23156 | null | kernel | media: venus: hfi_parser: refactor hfi packet parsing logic | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi_parser: refactor hfi packet parsing logic
words_count denotes the number of words in total payload, while data
points to payload of various property within it. When words_count
reaches last word, data can access memory beyond the total payload. This
can lead to OOB access. With this patch, the utility api for handling
individual properties now returns the size of data consumed. Accordingly
remaining bytes are calculated before parsing the payload, thereby
eliminates the OOB access possibilities. | null | 2025-05-01T00:00:00+00:00 | 2025-05-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-2914 | CWE-122 | hdf5 | HDF5 H5FScache.c H5FS__sinfo_Srialize_Sct_cb heap-based overflow | Low | null | 3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L | A flaw was found in HDF5. This vulnerability allows a heap-based buffer overflow via manipulating the sect argument in the H5FS__sinfo_Srialize_Sct_cb function of src/H5FScache.c. | null | 2025-03-28T17:00:50.098107+00:00 | 2025-03-28T16:31:05.962000+00:00 | [] | [
"red_hat_enterprise_linux_ai_(rhel_ai):hdf5"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-37816 | null | kernel | mei: vsc: Fix fortify-panic caused by invalid counted_by() use | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
mei: vsc: Fix fortify-panic caused by invalid counted_by() use
gcc 15 honors the __counted_by(len) attribute on vsc_tp_packet.buf[]
and the vsc-tp.c code is using this in a wrong way. len does not contain
the available size in the buffer, it contains the actual packet length
*without* the crc. So as soon as vsc_tp_xfer() tries to add the crc to
buf[] the fortify-panic handler gets triggered:
[ 80.842193] memcpy: detected buffer overflow: 4 byte write of buffer size 0
[ 80.842243] WARNING: CPU: 4 PID: 272 at lib/string_helpers.c:1032 __fortify_report+0x45/0x50
...
[ 80.843175] __fortify_panic+0x9/0xb
[ 80.843186] vsc_tp_xfer.cold+0x67/0x67 [mei_vsc_hw]
[ 80.843210] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
[ 80.843229] ? lockdep_hardirqs_on+0x7c/0x110
[ 80.843250] mei_vsc_hw_start+0x98/0x120 [mei_vsc]
[ 80.843270] mei_reset+0x11d/0x420 [mei]
The easiest fix would be to just drop the counted-by but with the exception
of the ack buffer in vsc_tp_xfer_helper() which only contains enough room
for the packet-header, all other uses of vsc_tp_packet always use a buffer
of VSC_TP_MAX_XFER_SIZE bytes for the packet.
Instead of just dropping the counted-by, split the vsc_tp_packet struct
definition into a header and a full-packet definition and use a fixed
size buf[] in the packet definition, this way fortify-source buffer
overrun checking still works when enabled. | null | 2025-05-08T00:00:00+00:00 | 2025-05-08T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-21868 | null | kernel | net: allow small head cache usage with large MAX_SKB_FRAGS values | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: allow small head cache usage with large MAX_SKB_FRAGS values
Sabrina reported the following splat:
WARNING: CPU: 0 PID: 1 at net/core/dev.c:6935 netif_napi_add_weight_locked+0x8f2/0xba0
Modules linked in:
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.14.0-rc1-net-00092-g011b03359038 #996
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
RIP: 0010:netif_napi_add_weight_locked+0x8f2/0xba0
Code: e8 c3 e6 6a fe 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc c7 44 24 10 ff ff ff ff e9 8f fb ff ff e8 9e e6 6a fe <0f> 0b e9 d3 fe ff ff e8 92 e6 6a fe 48 8b 04 24 be ff ff ff ff 48
RSP: 0000:ffffc9000001fc60 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff88806ce48128 RCX: 1ffff11001664b9e
RDX: ffff888008f00040 RSI: ffffffff8317ca42 RDI: ffff88800b325cb6
RBP: ffff88800b325c40 R08: 0000000000000001 R09: ffffed100167502c
R10: ffff88800b3a8163 R11: 0000000000000000 R12: ffff88800ac1c168
R13: ffff88800ac1c168 R14: ffff88800ac1c168 R15: 0000000000000007
FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff888008201000 CR3: 0000000004c94001 CR4: 0000000000370ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
gro_cells_init+0x1ba/0x270
xfrm_input_init+0x4b/0x2a0
xfrm_init+0x38/0x50
ip_rt_init+0x2d7/0x350
ip_init+0xf/0x20
inet_init+0x406/0x590
do_one_initcall+0x9d/0x2e0
do_initcalls+0x23b/0x280
kernel_init_freeable+0x445/0x490
kernel_init+0x20/0x1d0
ret_from_fork+0x46/0x80
ret_from_fork_asm+0x1a/0x30
</TASK>
irq event stamp: 584330
hardirqs last enabled at (584338): [<ffffffff8168bf87>] __up_console_sem+0x77/0xb0
hardirqs last disabled at (584345): [<ffffffff8168bf6c>] __up_console_sem+0x5c/0xb0
softirqs last enabled at (583242): [<ffffffff833ee96d>] netlink_insert+0x14d/0x470
softirqs last disabled at (583754): [<ffffffff8317c8cd>] netif_napi_add_weight_locked+0x77d/0xba0
on kernel built with MAX_SKB_FRAGS=45, where SKB_WITH_OVERHEAD(1024)
is smaller than GRO_MAX_HEAD.
Such built additionally contains the revert of the single page frag cache
so that napi_get_frags() ends up using the page frag allocator, triggering
the splat.
Note that the underlying issue is independent from the mentioned
revert; address it ensuring that the small head cache will fit either TCP
and GRO allocation and updating napi_alloc_skb() and __netdev_alloc_skb()
to select kmalloc() usage for any allocation fitting such cache. | null | 2025-03-27T00:00:00+00:00 | 2025-03-27T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2025-21757 | null | kernel | net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels | Important | null | 6.2/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H | No description is available for this CVE. | No Red Hat products are affected by this vulnerability. | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2025-0246 | CWE-451 | firefox | Address bar spoofing using an invalid protocol scheme on Firefox for Android | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N | A flaw was found in Firefox. The Mozilla Foundation's Security Advisory: When using an invalid protocol scheme, an attacker could spoof the address bar. Note: This issue is different than CVE-2025-0244. | Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory. This issue only affects Android operating systems. Other operating systems are unaffected. | 2025-01-07T17:01:59.900906+00:00 | 2025-01-07T16:07:05.551000+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:firefox",
"red_hat_enterprise_linux_7:firefox",
"red_hat_enterprise_linux_8:firefox",
"red_hat_enterprise_linux_9:firefox",
"red_hat_enterprise_linux_9:firefox:flatpak/firefox"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-23087 | CWE-1104 | node.js | End-of-Life Node.js Versions Pose Security Risks 17.x or prior | Important | null | 9.0/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | A flaw was found in Node.js. This vulnerability allows potential exposure to unaddressed software vulnerabilities via the continued use of End-of-Life (EOL) versions that no longer receive security updates or patches. | Red Hat Enterprise Linux is not impacted by this CVE, as it does not include or ship any End-of-Life (EOL) versions of Node.js in its supported repositories. Red Hat ensures that all components provided in its distributions are actively maintained and receive necessary updates, including security patches, to mitigate vulnerabilities and maintain system security. | 2025-01-22T02:00:47.904130+00:00 | 2025-01-22T01:11:30.821000+00:00 | [] | [] | [
"red_hat_enterprise_linux_8:nodejs:18/nodejs",
"red_hat_enterprise_linux_8:nodejs:20/nodejs"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-21540 | null | mysql | Privileges unspecified vulnerability (CPU Jan 2025) | Moderate | null | 5.6/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | null | 2025-01-21T21:02:33.051436+00:00 | 2025-01-21T20:53:12.277000+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
] | [] | [
"red_hat_enterprise_linux_6:mysql"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258"
] | [
"2025-02-19T11:10:11+00:00",
"2025-02-19T10:31:41+00:00"
] |
CVE-2025-21813 | CWE-362 | kernel | timers/migration: Fix off-by-one root mis-connection | Moderate | null | 4.7/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
timers/migration: Fix off-by-one root mis-connection
Before attaching a new root to the old root, the children counter of the
new root is checked to verify that only the upcoming CPU's top group have
been connected to it. However since the recently added commit b729cc1ec21a
("timers/migration: Fix another race between hotplug and idle entry/exit")
this check is not valid anymore because the old root is pre-accounted
as a child to the new root. Therefore after connecting the upcoming
CPU's top group to the new root, the children count to be expected must
be 2 and not 1 anymore.
This omission results in the old root to not be connected to the new
root. Then eventually the system may run with more than one top level,
which defeats the purpose of a single idle migrator.
Also the old root is pre-accounted but not connected upon the new root
creation. But it can be connected to the new root later on. Therefore
the old root may be accounted twice to the new root. The propagation of
such overcommit can end up creating a double final top-level root with a
groupmask incorrectly initialized. Although harmless given that the final
top level roots will never have a parent to walk up to, this oddity
opportunistically reported the core issue:
WARNING: CPU: 8 PID: 0 at kernel/time/timer_migration.c:543 tmigr_requires_handle_remote
CPU: 8 UID: 0 PID: 0 Comm: swapper/8
RIP: 0010:tmigr_requires_handle_remote
Call Trace:
<IRQ>
? tmigr_requires_handle_remote
? hrtimer_run_queues
update_process_times
tick_periodic
tick_handle_periodic
__sysvec_apic_timer_interrupt
sysvec_apic_timer_interrupt
</IRQ>
Fix the problem by taking the old root into account in the children count
of the new root so the connection is not omitted.
Also warn when more than one top level group exists to better detect
similar issues in the future. | There is no known scenario of attack and some complex preconditions should happen to trigger the bug, so the security impact is limited. | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-21956 | null | kernel | drm/amd/display: Assign normalized_pix_clk when color depth = 14 | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Assign normalized_pix_clk when color depth = 14
[WHY & HOW]
A warning message "WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397
calculate_phy_pix_clks+0xef/0x100 [amdgpu]" occurs because the
display_color_depth == COLOR_DEPTH_141414 is not handled. This is
observed in Radeon RX 6600 XT.
It is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.
Also fixes the indentation in get_norm_pix_clk.
(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775) | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2025-37882 | null | kernel | usb: xhci: Fix isochronous Ring Underrun/Overrun event handling | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | No description is available for this CVE. | null | 2025-05-09T00:00:00+00:00 | 2025-05-09T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-22100 | CWE-362 | kernel | drm/panthor: Fix race condition when gathering fdinfo group samples | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Fix race condition when gathering fdinfo group samples
Commit e16635d88fa0 ("drm/panthor: add DRM fdinfo support") failed to
protect access to groups with an xarray lock, which could lead to
use-after-free errors. | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-37752 | null | kernel | net_sched: sch_sfq: move the limit validation | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net_sched: sch_sfq: move the limit validation
It is not sufficient to directly validate the limit on the data that
the user passes as it can be updated based on how the other parameters
are changed.
Move the check at the end of the configuration update process to also
catch scenarios where the limit is indirectly updated, for example
with the following configurations:
tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1
tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1
This fixes the following syzkaller reported crash:
------------[ cut here ]------------
UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6
index 65535 is out of range for type 'struct sfq_head[128]'
CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120
ubsan_epilogue lib/ubsan.c:231 [inline]
__ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429
sfq_link net/sched/sch_sfq.c:203 [inline]
sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231
sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493
sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518
qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035
tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339
qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035
dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311
netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]
dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375 | null | 2025-05-01T00:00:00+00:00 | 2025-05-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2025-21686 | CWE-20 | kernel | io_uring/rsrc: require cloned buffers to share accounting contexts | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
io_uring/rsrc: require cloned buffers to share accounting contexts
When IORING_REGISTER_CLONE_BUFFERS is used to clone buffers from uring
instance A to uring instance B, where A and B use different MMs for
accounting, the accounting can go wrong:
If uring instance A is closed before uring instance B, the pinned memory
counters for uring instance B will be decremented, even though the pinned
memory was originally accounted through uring instance A; so the MM of
uring instance B can end up with negative locked memory. | null | 2025-02-10T00:00:00+00:00 | 2025-02-10T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-32415 | CWE-1284 | libxml2 | Out-of-bounds Read in xmlSchemaIDCFillNodeTables | Low | null | 2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L | In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used. | null | 2025-04-17T18:00:46.954384+00:00 | 2025-04-17T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:libxml2",
"red_hat_enterprise_linux_7:libxml2",
"red_hat_enterprise_linux_8:libxml2",
"red_hat_enterprise_linux_9:libxml2",
"red_hat_jboss_core_services:libxml2",
"red_hat_openshift_container_platform_4:rhcos"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-32045 | CWE-862 | moodle | Hidden Grades Shown to Users Without Permission on Some Grade Reports | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-04-02T07:17:19.564000+00:00 | 2025-04-02T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-21669 | CWE-476 | kernel | vsock/virtio: discard packets if the transport changes | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: discard packets if the transport changes
If the socket has been de-assigned or assigned to another transport,
we must discard any packets received because they are not expected
and would cause issues when we access vsk->transport.
A possible scenario is described by Hyunwoo Kim in the attached link,
where after a first connect() interrupted by a signal, and a second
connect() failed, we can find `vsk->transport` at NULL, leading to a
NULL pointer dereference. | null | 2025-01-31T00:00:00+00:00 | 2025-01-31T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Will not fix",
"Affected"
] | [
null,
null,
null
] |
CVE-2025-22045 | null | kernel | x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs
On the following path, flush_tlb_range() can be used for zapping normal
PMD entries (PMD entries that point to page tables) together with the PTE
entries in the pointed-to page table:
collapse_pte_mapped_thp
pmdp_collapse_flush
flush_tlb_range
The arm64 version of flush_tlb_range() has a comment describing that it can
be used for page table removal, and does not use any last-level
invalidation optimizations. Fix the X86 version by making it behave the
same way.
Currently, X86 only uses this information for the following two purposes,
which I think means the issue doesn't have much impact:
- In native_flush_tlb_multi() for checking if lazy TLB CPUs need to be
IPI'd to avoid issues with speculative page table walks.
- In Hyper-V TLB paravirtualization, again for lazy TLB stuff.
The patch "x86/mm: only invalidate final translations with INVLPGB" which
is currently under review (see
<https://lore.kernel.org/all/[email protected]/>)
would probably be making the impact of this a lot worse. | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-21844 | CWE-476 | kernel | smb: client: Add check for next_buffer in receive_encrypted_standard() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
smb: client: Add check for next_buffer in receive_encrypted_standard()
Add check for the return value of cifs_buf_get() and cifs_small_buf_get()
in receive_encrypted_standard() to prevent null pointer dereference. | null | 2025-03-12T00:00:00+00:00 | 2025-03-12T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2025-1247 | CWE-488 | io.quarkus | quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance | Important | null | 8.6/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L | A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information. | This vulnerability marked as important severity rather than moderate because it leads to cross-request data leakage, which can compromise the confidentiality and integrity of user interactions. In a concurrent environment, multiple requests being served by a single, shared instance of an endpoint class means that sensitive request data—such as authentication headers, cookies, or form parameters—can be inadvertently exposed to other users. This violates fundamental HTTP request isolation principles, potentially leading to session hijacking, unauthorized access, or privilege escalation. | 2025-02-12T09:30:25.106000+00:00 | 2025-02-12T00:00:00+00:00 | [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15",
"Red Hat build of Quarkus 3.15.3.SP1",
"Red Hat build of Quarkus 3.8.6.SP3"
] | [] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround"
] | [
"Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\nThe References section of this erratum contains a download link (you must log in to download the update).",
"Before applying this update, ensure that all previously released errata relevant to your system are applied. \n\nFor details about applying this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
"2025-03-03T13:23:22+00:00",
"2025-02-27T13:16:16+00:00",
"2025-02-27T15:15:05+00:00",
null
] |
CVE-2025-0905 | null | PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | null | null | null | PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25433. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-01-30T20:36:29.436000+00:00 | 2025-01-31T22:07:55.139000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-26682 | CWE-770 | dotnet | .NET: ASP.NET Core denial of service with HTTP/3 | Important | null | 7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | A flaw was found in dotnet. Improper use of the HTTP/3 protocol allows an unauthorized remote attacker to cause an allocation of resources without limits or throttling in ASP.NET Core, resulting in a denial of service. | This issue can only be exploited when support for the HTTP/3 protocol is enabled. The .NET packages shipped in Red Hat Enterprise Linux do not support the HTTP/3 protocol. Therefore, Red Hat products are not affected by this vulnerability. | 2025-04-07T14:56:03.993000+00:00 | 2025-04-08T16:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_8:dotnet8.0",
"red_hat_enterprise_linux_8:dotnet9.0",
"red_hat_enterprise_linux_9:dotnet6.0",
"red_hat_enterprise_linux_9:dotnet7.0",
"red_hat_enterprise_linux_9:dotnet8.0",
"red_hat_enterprise_linux_9:dotnet9.0"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2025-1302 | CWE-94 | jsonpath-plus | Remote Code Execution in jsonpath-plus via Improper Input Sanitization | Low | null | 9.8/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | A flaw was found in jsonpath-plus. This vulnerability allows remote code execution (RCE) via improper input sanitization, exploiting the unsafe default usage of eval='safe' mode. | Red Hat's initial impact rating of critical has been downgraded to low. While the vulnerable code is technically still present within Red Hat products, there are no code paths in affected products which allow exploitation. As such, the impact to Red Hat products is low.
Each of the products listed have multiple components where a fixed build could occur. This distinction does not matter for users as only one build needs fixed for the product. Additionally, in Red Hat OpenShift AI, jsonpath-plus is a dependency of a direct dependency and is never loaded, as the direct dependency's feature that requires jsonpath-plus is not used. | 2025-02-15T06:00:41.095749+00:00 | 2025-02-15T05:00:01.061000+00:00 | [] | [
"red_hat_openshift_dev_spaces:devspaces/code-rhel8",
"red_hat_openshift_dev_spaces:devspaces/dashboard-rhel8"
] | [
"openshift_serverless:kn-backstage-plugins-eventmesh-rhel8",
"red_hat_openshift_ai_(rhoai):odh-dashboard-container",
"red_hat_openshift_ai_(rhoai):odh-operator-container"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Red Hat Product Security recommends updating the vulnerable software to the latest version.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-21901 | CWE-476 | kernel | RDMA/bnxt_re: Add sanity checks on rdev validity | Low | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
RDMA/bnxt_re: Add sanity checks on rdev validity
There is a possibility that ulp_irq_stop and ulp_irq_start
callbacks will be called when the device is in detached state.
This can cause a crash due to NULL pointer dereference as
the rdev is already freed. | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-0840 | CWE-121 | binutils | GNU Binutils objdump.c disassemble_bytes stack-based overflow | Moderate | null | 5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L | A flaw was found in GNU Binutils. This vulnerability allows a stack-based buffer overflow via manipulation of the buf argument in the disassemble_bytes function. | Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer or a CWE-121: Stack-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.
Secure baseline configurations have helped to enable a secure ecosystem for the FedRAMP environment. Rigorous testing and development practices (SAST, DAST, etc.) identify and address memory vulnerabilities before they are promoted to Red Hat production platforms, and the malicious code protection used in FedRAMP further mitigates impacts by detecting, blocking, and responding to exploitation attempts. FedRAMP uses OS versions that inherit certain security tools and features from RHEL that are enabled by default, such as SELinux and Address Space Layout Randomization (ASLR). Least functionality and process isolation minimizes the attack surface by disabling unauthorized services and ports and containing any corruption within the originating process, preventing it from affecting other processes or the system as a whole. | 2025-01-29T21:01:02.699967+00:00 | 2025-01-29T20:00:11.944000+00:00 | [] | [
"red_hat_enterprise_linux_9:mingw-binutils"
] | [
"red_hat_enterprise_linux_6:binutils",
"red_hat_enterprise_linux_7:binutils",
"red_hat_enterprise_linux_7:gdb",
"red_hat_enterprise_linux_8:binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_8:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-14-gdb",
"red_hat_enterprise_linux_8:gdb",
"red_hat_enterprise_linux_8:mingw-binutils",
"red_hat_enterprise_linux_9:binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_9:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_9:gdb"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-46646 | CWE-24 | Ghostscript | Mishandling of Overlong UTF-8 Encoding in Artifex Ghostscript's decode_utf8 Function | Moderate | null | 4.5/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N | A flaw was found in Artifex Ghostscript, specifically in the decode_utf8 function within base/gp_utf8.c. The issue arises from the mishandling of overlong UTF-8 encoding, which can lead to unexpected behavior when processing certain inputs. This flaw could allow an attacker to manipulate text encoding, potentially leading to incorrect processing of UTF-8 characters or unexpected application behavior, and exists because of an incomplete fix for CVE-2024-46954. | null | 2025-04-26T15:00:46.290890+00:00 | 2025-04-26T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:ghostscript",
"red_hat_enterprise_linux_7:ghostscript",
"red_hat_enterprise_linux_8:ghostscript",
"red_hat_enterprise_linux_9:ghostscript"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-1181 | CWE-119 | binutils | GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption | Moderate | null | 5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L | A flaw was found in GNU Binutil. This vulnerability allows memory corruption via manipulation of the _bfd_elf_gc_mark_rsec function. | null | 2025-02-11T09:00:43.011812+00:00 | 2025-02-11T08:00:11.337000+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:binutils",
"red_hat_enterprise_linux_7:binutils",
"red_hat_enterprise_linux_7:gdb",
"red_hat_enterprise_linux_8:binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_8:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-14-gdb",
"red_hat_enterprise_linux_8:gdb",
"red_hat_enterprise_linux_8:mingw-binutils",
"red_hat_enterprise_linux_9:binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_9:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_9:gdb",
"red_hat_enterprise_linux_9:mingw-binutils"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-22012 | CWE-20 | kernel | Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu" | Low | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu"
There are reports that the pagetable walker cache coherency is not a
given across the spectrum of SDM845/850 devices, leading to lock-ups
and resets. It works fine on some devices (like the Dragonboard 845c,
but not so much on the Lenovo Yoga C630).
This unfortunately looks like a fluke in firmware development, where
likely somewhere in the vast hypervisor stack, a change to accommodate
for this was only introduced after the initial software release (which
often serves as a baseline for products).
Revert the change to avoid additional guesswork around crashes.
This reverts commit 6b31a9744b8726c69bb0af290f8475a368a4b805. | null | 2025-04-08T00:00:00+00:00 | 2025-04-08T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2025-32911 | CWE-590 | libsoup | Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value | Important | null | 8.9/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H | A use-after-free type vulnerability was found in libsoup, in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server. | null | 2025-04-14T01:21:00.518000+00:00 | 2025-04-14T00:00:00+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.src",
"AppStream-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.src",
"AppStream-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.src",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.src",
"AppStream-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.src",
"AppStream-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.src",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.src",
"AppStream-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.src",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.src",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.src",
"BaseOS-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.src",
"BaseOS-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.src",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.src",
"BaseOS-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.src",
"BaseOS-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.src",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.src",
"BaseOS-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64"
] | [
"red_hat_enterprise_linux_6:libsoup",
"red_hat_enterprise_linux_7:libsoup",
"red_hat_enterprise_linux_9:libsoup"
] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Currently, no mitigation is available for this vulnerability.",
"Out of support scope",
"Affected"
] | [
"2025-05-06T15:43:33+00:00",
"2025-05-06T13:53:30+00:00",
"2025-05-07T04:31:24+00:00",
"2025-05-07T07:04:14+00:00",
"2025-05-06T16:48:22+00:00",
"2025-05-05T01:17:42+00:00",
"2025-05-06T16:03:20+00:00",
"2025-05-05T01:24:57+00:00",
null,
null,
null
] |
CVE-2025-2312 | CWE-488 | cifs-utils | kernel: cifs-utils: cifs.upcall makes an upcall to the wrong namespace in containerized environments | Moderate | null | 5.9/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N | A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host's Kerberos credentials cache. | No evidence was found of the possibility of a container escape, restricting the impact to confidentiality. Hence, this flaw is rated with a Moderate impact rating.
This flaws affects only the cifs-utils component but requires a two part fix. This is why the kernel component is also listed. | 2025-03-14T00:00:00+00:00 | 2025-01-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:cifs-utils",
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:cifs-utils",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:cifs-utils",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:cifs-utils",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"no_fix_planned",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Out of support scope",
"Affected"
] | [
null,
null,
null
] |
CVE-2025-32442 | CWE-1287 | Fastify | Fastify vulnerable to invalid content-type parsing, which could lead to validation bypass | Important | null | 7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | A flaw was found in Fastify. In affected versions, applications that specify different validation strategies for various content types can bypass validation by using a _slightly altered_ content type, such as with different casing or altered whitespace before `;`. | None of the Red Hat Products and Services are impacted by this vulnerability. | 2025-04-18T17:00:46.316414+00:00 | 2025-04-18T15:59:06.670000+00:00 | [] | [] | [
"openshift_serverless:openshift-serverless-1/kn-plugin-func-func-util-rhel8",
"red_hat_openshift_ai_(rhoai):odh-dashboard-container",
"red_hat_openshift_ai_(rhoai):odh-operator-container",
"red_hat_openshift_ai_(rhoai):rhoai/odh-dashboard-rhel8",
"red_hat_openshift_dev_spaces:devspaces/dashboard-rhel8",
"red_hat_openshift_dev_spaces:devspaces/dashboard-rhel9"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"workaround"
] | [
"To mitigate this vulnerability, do not specify multiple content types in the schema."
] | [
null
] |
CVE-2025-21794 | CWE-119 | kernel | HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() | Moderate | null | 7.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from
hid-thrustmaster driver. This array is passed to usb_check_int_endpoints
function from usb.c core driver, which executes a for loop that iterates
over the elements of the passed array. Not finding a null element at the end of
the array, it tries to read the next, non-existent element, crashing the kernel.
To fix this, a 0 element was added at the end of the array to break the for
loop.
[1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad | null | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-21501 | null | mysql | Optimizer unspecified vulnerability (CPU Jan 2025) | Moderate | null | 6.7/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | null | 2025-01-21T21:04:52.611944+00:00 | 2025-01-21T20:52:56.037000+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
] | [] | [
"red_hat_enterprise_linux_6:mysql"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258"
] | [
"2025-02-19T11:10:11+00:00",
"2025-02-19T10:31:41+00:00"
] |
CVE-2025-21852 | CWE-476 | kernel | net: Add rx_skb of kfree_skb to raw_tp_null_args[]. | Moderate | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: Add rx_skb of kfree_skb to raw_tp_null_args[].
Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0]
in trace_kfree_skb if the prog does not check if rx_sk is NULL.
Commit c53795d48ee8 ("net: add rx_sk to trace_kfree_skb") added
rx_sk to trace_kfree_skb, but rx_sk is optional and could be NULL.
Let's add kfree_skb to raw_tp_null_args[] to let the BPF verifier
validate such a prog and prevent the issue.
Now we fail to load such a prog:
libbpf: prog 'drop': -- BEGIN PROG LOAD LOG --
0: R1=ctx() R10=fp0
; int BPF_PROG(drop, struct sk_buff *skb, void *location, @ kfree_skb_sk_null.bpf.c:21
0: (79) r3 = *(u64 *)(r1 +24)
func 'kfree_skb' arg3 has btf_id 5253 type STRUCT 'sock'
1: R1=ctx() R3_w=trusted_ptr_or_null_sock(id=1)
; bpf_printk("sk: %d, %d\n", sk, sk->__sk_common.skc_family); @ kfree_skb_sk_null.bpf.c:24
1: (69) r4 = *(u16 *)(r3 +16)
R3 invalid mem access 'trusted_ptr_or_null_'
processed 2 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
-- END PROG LOAD LOG --
Note this fix requires commit 838a10bd2ebf ("bpf: Augment raw_tp
arguments with PTR_MAYBE_NULL").
[0]:
BUG: kernel NULL pointer dereference, address: 0000000000000010
PF: supervisor read access in kernel mode
PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
PREEMPT SMP
RIP: 0010:bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d
Call Trace:
<TASK>
? __die+0x1f/0x60
? page_fault_oops+0x148/0x420
? search_bpf_extables+0x5b/0x70
? fixup_exception+0x27/0x2c0
? exc_page_fault+0x75/0x170
? asm_exc_page_fault+0x22/0x30
? bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d
bpf_trace_run4+0x68/0xd0
? unix_stream_connect+0x1f4/0x6f0
sk_skb_reason_drop+0x90/0x120
unix_stream_connect+0x1f4/0x6f0
__sys_connect+0x7f/0xb0
__x64_sys_connect+0x14/0x20
do_syscall_64+0x47/0xc30
entry_SYSCALL_64_after_hwframe+0x4b/0x53 | null | 2025-03-12T00:00:00+00:00 | 2025-03-12T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Will not fix"
] | [
null
] |
CVE-2025-1744 | CWE-787 | radare2 | Out-of-bounds Write in radare2 | Critical | null | 10/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | Out-of-bounds Write vulnerability in radareorg radare2 allows
heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-02-28T04:00:44.321171+00:00 | 2025-02-28T03:24:50.301000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Critical"
] | [
null
] | [] | [] | [] |
CVE-2025-21917 | CWE-476 | kernel | usb: renesas_usbhs: Flush the notify_hotplug_work | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
usb: renesas_usbhs: Flush the notify_hotplug_work
When performing continuous unbind/bind operations on the USB drivers
available on the Renesas RZ/G2L SoC, a kernel crash with the message
"Unable to handle kernel NULL pointer dereference at virtual address"
may occur. This issue points to the usbhsc_notify_hotplug() function.
Flush the delayed work to avoid its execution when driver resources are
unavailable. | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-24216 | CWE-119 | webkitgtk | Processing maliciously crafted web content may lead to an unexpected Safari crash | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling. | To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. | 2025-04-07T14:29:49.645000+00:00 | 2025-04-07T00:00:00+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.48.1-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_8.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.src",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.x86_64"
] | [
"red_hat_enterprise_linux_6:webkitgtk",
"red_hat_enterprise_linux_7:webkitgtk3",
"red_hat_enterprise_linux_7:webkitgtk4"
] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"Out of support scope",
"Will not fix",
"Affected"
] | [
"2025-04-17T06:50:23+00:00",
"2025-05-05T01:45:33+00:00",
"2025-04-09T14:03:47+00:00",
"2025-04-09T14:04:57+00:00",
"2025-04-08T21:04:15+00:00",
null,
null,
null,
null
] |
CVE-2025-2241 | CWE-922 | hive | Exposure of VCenter Credentials via ClusterProvision in Hive / MCE / ACM | Important | null | 8.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N | A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation. | Hive is an operator which runs as a service for provisioning and perform initial configuration of OpenShift clusters. During this process users are creating instances of hive CRDs and other k8s objects, including a Secret containing credentials where Hive take these inputs and invokes openshift-install to create the spoke cluster. During this process it generations additional objects. One of these objects is an instance of a hive CRD called ClusterProvision. The ClusterProvision object contains unintentionally sensitive information, which may be accessed by unauthorized actors. | 2025-03-11T12:43:34.302000+00:00 | 2025-03-17T15:52:50.098000+00:00 | [] | [
"multicluster_engine_for_kubernetes:multicluster-engine/multicloud-manager-rhel8",
"red_hat_advanced_cluster_management_for_kubernetes_2:rhacm2/cluster-backup-rhel9-operator"
] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"workaround",
"none_available"
] | [
"A few mechanisms are available to reduce the risks and mitigate this vulnerability:\n\n1. Restrict Access to ClusterProvision Objects\n\nEnsure that only trusted users with valid VCenter credentials have read access to ClusterProvision objects.\nThis can be verified using the following commands:\n\noc adm policy who-can get clusterprovision\noc adm policy who-can read clusterprovision\n\n2. Rotate VCenter Credentials\n\nImmediately rotate VCenter credentials to revoke access for any users who may have already accessed the exposed credentials.\n\n3. Audit VCenter Users and Roles\n\nConduct a security audit of VCenter accounts and roles to detect any unauthorized access or configuration changes.\n\nIf any suspicious activity is found, revoke access by rotating credentials again (step 2) and taking necessary remediation actions.",
"Affected"
] | [
null,
null
] |
CVE-2025-21782 | CWE-125 | kernel | orangefs: fix a oob in orangefs_debug_write | Moderate | null | 7.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
orangefs: fix a oob in orangefs_debug_write
I got a syzbot report: slab-out-of-bounds Read in
orangefs_debug_write... several people suggested fixes,
I tested Al Viro's suggestion and made this patch. | null | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-2754 | CWE-122 | assimp | Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow | Moderate | null | 6.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L | A flaw was found in the Open Asset Import Library Assimp. The Assimp::AC3DImporter::ConvertObjectSection function of the code/AssetLib/AC/ACLoader.cpp file in the AC3D File Handler component is affected. This attack can be launched remotely, and manipulation of the argument can lead to a heap-based buffer overflow. | null | 2025-03-25T09:00:43.228171+00:00 | 2025-03-25T08:31:07.954000+00:00 | [] | [
"red_hat_enterprise_linux_9:qt5-qt3d"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-1178 | CWE-119 | binutils | GNU Binutils ld libbfd.c bfd_putl64 memory corruption | Moderate | null | 5.6/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L | A flaw was found in GNU Binutils. This vulnerability allows memory corruption via manipulation of the bfd_putl64 function. | null | 2025-02-11T07:00:42.655905+00:00 | 2025-02-11T06:31:12.580000+00:00 | [] | [
"red_hat_enterprise_linux_9:mingw-binutils"
] | [
"red_hat_enterprise_linux_6:binutils",
"red_hat_enterprise_linux_7:binutils",
"red_hat_enterprise_linux_7:gdb",
"red_hat_enterprise_linux_8:binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_8:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-14-gdb",
"red_hat_enterprise_linux_8:gdb",
"red_hat_enterprise_linux_8:mingw-binutils",
"red_hat_enterprise_linux_9:binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_9:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_9:gdb"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-32907 | CWE-1050 | libsoup | Denial of service in server when client requests a large amount of overlapping ranges with Range header | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L | A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service. | null | 2025-04-14T01:27:08.699000+00:00 | 2025-04-14T00:00:00+00:00 | [
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.src",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.src",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.x86_64"
] | [
"red_hat_enterprise_linux_6:libsoup",
"red_hat_enterprise_linux_7:libsoup",
"red_hat_enterprise_linux_9:libsoup"
] | [
"red_hat_enterprise_linux_8:libsoup"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Currently, no mitigation was found for this vulnerability.",
"Out of support scope",
"Affected"
] | [
"2025-05-05T01:17:42+00:00",
"2025-05-06T16:03:20+00:00",
"2025-05-05T01:24:57+00:00",
null,
null,
null
] |
CVE-2025-22004 | null | kernel | net: atm: fix use after free in lec_send() | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: atm: fix use after free in lec_send()
The ->send() operation frees skb so save the length before calling
->send() to avoid a use after free. | null | 2025-04-03T00:00:00+00:00 | 2025-04-03T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-21805 | null | kernel | RDMA/rtrs: Add missing deinit() call | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
RDMA/rtrs: Add missing deinit() call
A warning is triggered when repeatedly connecting and disconnecting the
rnbd:
list_add corruption. prev->next should be next (ffff88800b13e480), but was ffff88801ecd1338. (prev=ffff88801ecd1340).
WARNING: CPU: 1 PID: 36562 at lib/list_debug.c:32 __list_add_valid_or_report+0x7f/0xa0
Workqueue: ib_cm cm_work_handler [ib_cm]
RIP: 0010:__list_add_valid_or_report+0x7f/0xa0
? __list_add_valid_or_report+0x7f/0xa0
ib_register_event_handler+0x65/0x93 [ib_core]
rtrs_srv_ib_dev_init+0x29/0x30 [rtrs_server]
rtrs_ib_dev_find_or_add+0x124/0x1d0 [rtrs_core]
__alloc_path+0x46c/0x680 [rtrs_server]
? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server]
? rcu_is_watching+0xd/0x40
? __mutex_lock+0x312/0xcf0
? get_or_create_srv+0xad/0x310 [rtrs_server]
? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server]
rtrs_rdma_connect+0x23c/0x2d0 [rtrs_server]
? __lock_release+0x1b1/0x2d0
cma_cm_event_handler+0x4a/0x1a0 [rdma_cm]
cma_ib_req_handler+0x3a0/0x7e0 [rdma_cm]
cm_process_work+0x28/0x1a0 [ib_cm]
? _raw_spin_unlock_irq+0x2f/0x50
cm_req_handler+0x618/0xa60 [ib_cm]
cm_work_handler+0x71/0x520 [ib_cm]
Commit 667db86bcbe8 ("RDMA/rtrs: Register ib event handler") introduced a
new element .deinit but never used it at all. Fix it by invoking the
`deinit()` to appropriately unregister the IB event handler. | null | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2025-32395 | CWE-200 | vite | Vite has an `server.fs.deny` bypass with an invalid `request-target` | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | A flaw was found in Vite. This vulnerability allows arbitrary file access via specially crafted HTTP requests containing a # character in the request URL. The issue occurs when the server is run on Node.js or Bun and exposed to the network. Improper handling of invalid request lines allows these requests to bypass security checks that restrict file access. | null | 2025-04-10T14:01:21.290484+00:00 | 2025-04-10T13:25:19.177000+00:00 | [] | [
"red_hat_ansible_automation_platform_2:automation-controller",
"red_hat_ansible_automation_platform_2:automation-eda-controller",
"red_hat_ansible_automation_platform_2:automation-gateway",
"red_hat_jboss_enterprise_application_platform_8:org.keycloak-keycloak-parent",
"red_hat_jboss_enterprise_application_platform_expansion_pack:org.keycloak-keycloak-parent",
"red_hat_openshift_distributed_tracing_3:rhosdt/tempo-gateway-opa-rhel8",
"red_hat_openshift_distributed_tracing_3:rhosdt/tempo-gateway-rhel8",
"red_hat_openshift_distributed_tracing_3:rhosdt/tempo-jaeger-query-rhel8",
"red_hat_openshift_distributed_tracing_3:rhosdt/tempo-query-rhel8",
"red_hat_openshift_distributed_tracing_3:rhosdt/tempo-rhel8",
"red_hat_openshift_distributed_tracing_3:rhosdt/tempo-rhel8-operator"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-21940 | CWE-476 | kernel | drm/amdkfd: Fix NULL Pointer Dereference in KFD queue | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix NULL Pointer Dereference in KFD queue
Through KFD IOCTL Fuzzing we encountered a NULL pointer derefrence
when calling kfd_queue_acquire_buffers.
(cherry picked from commit 049e5bf3c8406f87c3d8e1958e0a16804fa1d530) | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-1713 | CWE-833 | xen | Deadlock Potential with VT-d and Legacy PCI Device Pass-Through | Moderate | null | 6.3/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H | A flaw was found in Xen's handling of interrupt remapping for legacy PCI(-X) devices when using Intel's VT-d. Specifically, acquiring a lock during the setup process in an unsafe context can lead to a deadlock. This issue can be triggered by passing through certain devices to unprivileged guests, potentially resulting in a denial of service affecting the entire host. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-02-27T00:00:00+00:00 | 2025-02-27T15:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-21690 | CWE-400 | kernel | scsi: storvsc: Ratelimit warning logs to prevent VM denial of service | Low | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
If there's a persistent error in the hypervisor, the SCSI warning for
failed I/O can flood the kernel log and max out CPU utilization,
preventing troubleshooting from the VM side. Ratelimit the warning so
it doesn't DoS the VM. | null | 2025-02-10T00:00:00+00:00 | 2025-02-10T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-37744 | null | kernel | wifi: ath12k: fix memory leak in ath12k_pci_remove() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix memory leak in ath12k_pci_remove()
Kmemleak reported this error:
unreferenced object 0xffff1c165cec3060 (size 32):
comm "insmod", pid 560, jiffies 4296964570 (age 235.596s)
backtrace:
[<000000005434db68>] __kmem_cache_alloc_node+0x1f4/0x2c0
[<000000001203b155>] kmalloc_trace+0x40/0x88
[<0000000028adc9c8>] _request_firmware+0xb8/0x608
[<00000000cad1aef7>] firmware_request_nowarn+0x50/0x80
[<000000005011a682>] local_pci_probe+0x48/0xd0
[<00000000077cd295>] pci_device_probe+0xb4/0x200
[<0000000087184c94>] really_probe+0x150/0x2c0
The firmware memory was allocated in ath12k_pci_probe(), but not
freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is
set. So call ath12k_fw_unmap() to free the memory.
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1 | null | 2025-05-01T00:00:00+00:00 | 2025-05-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2025-3407 | CWE-125 | stb | Nothings stb out-of-bounds read | Moderate | null | 6.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L | A flaw was found in stb. This vulnerability allows an out-of-bounds read via manipulation of the h_count or v_count arguments. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-04-08T05:01:34.649185+00:00 | 2025-04-08T04:00:11.732000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-22116 | null | kernel | idpf: check error for register_netdev() on init | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
idpf: check error for register_netdev() on init
Current init logic ignores the error code from register_netdev(),
which will cause WARN_ON() on attempt to unregister it, if there was one,
and there is no info for the user that the creation of the netdev failed.
WARNING: CPU: 89 PID: 6902 at net/core/dev.c:11512 unregister_netdevice_many_notify+0x211/0x1a10
...
[ 3707.563641] unregister_netdev+0x1c/0x30
[ 3707.563656] idpf_vport_dealloc+0x5cf/0xce0 [idpf]
[ 3707.563684] idpf_deinit_task+0xef/0x160 [idpf]
[ 3707.563712] idpf_vc_core_deinit+0x84/0x320 [idpf]
[ 3707.563739] idpf_remove+0xbf/0x780 [idpf]
[ 3707.563769] pci_device_remove+0xab/0x1e0
[ 3707.563786] device_release_driver_internal+0x371/0x530
[ 3707.563803] driver_detach+0xbf/0x180
[ 3707.563816] bus_remove_driver+0x11b/0x2a0
[ 3707.563829] pci_unregister_driver+0x2a/0x250
Introduce an error check and log the vport number and error code.
On removal make sure to check VPORT_REG_NETDEV flag prior to calling
unregister and free on the netdev.
Add local variables for idx, vport_config and netdev for readability. | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-22053 | CWE-413 | kernel | net: ibmveth: make veth_pool_store stop hanging | Moderate | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: ibmveth: make veth_pool_store stop hanging
v2:
- Created a single error handling unlock and exit in veth_pool_store
- Greatly expanded commit message with previous explanatory-only text
Summary: Use rtnl_mutex to synchronize veth_pool_store with itself,
ibmveth_close and ibmveth_open, preventing multiple calls in a row to
napi_disable.
Background: Two (or more) threads could call veth_pool_store through
writing to /sys/devices/vio/30000002/pool*/*. You can do this easily
with a little shell script. This causes a hang.
I configured LOCKDEP, compiled ibmveth.c with DEBUG, and built a new
kernel. I ran this test again and saw:
Setting pool0/active to 0
Setting pool1/active to 1
[ 73.911067][ T4365] ibmveth 30000002 eth0: close starting
Setting pool1/active to 1
Setting pool1/active to 0
[ 73.911367][ T4366] ibmveth 30000002 eth0: close starting
[ 73.916056][ T4365] ibmveth 30000002 eth0: close complete
[ 73.916064][ T4365] ibmveth 30000002 eth0: open starting
[ 110.808564][ T712] systemd-journald[712]: Sent WATCHDOG=1 notification.
[ 230.808495][ T712] systemd-journald[712]: Sent WATCHDOG=1 notification.
[ 243.683786][ T123] INFO: task stress.sh:4365 blocked for more than 122 seconds.
[ 243.683827][ T123] Not tainted 6.14.0-01103-g2df0c02dab82-dirty #8
[ 243.683833][ T123] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 243.683838][ T123] task:stress.sh state:D stack:28096 pid:4365 tgid:4365 ppid:4364 task_flags:0x400040 flags:0x00042000
[ 243.683852][ T123] Call Trace:
[ 243.683857][ T123] [c00000000c38f690] [0000000000000001] 0x1 (unreliable)
[ 243.683868][ T123] [c00000000c38f840] [c00000000001f908] __switch_to+0x318/0x4e0
[ 243.683878][ T123] [c00000000c38f8a0] [c000000001549a70] __schedule+0x500/0x12a0
[ 243.683888][ T123] [c00000000c38f9a0] [c00000000154a878] schedule+0x68/0x210
[ 243.683896][ T123] [c00000000c38f9d0] [c00000000154ac80] schedule_preempt_disabled+0x30/0x50
[ 243.683904][ T123] [c00000000c38fa00] [c00000000154dbb0] __mutex_lock+0x730/0x10f0
[ 243.683913][ T123] [c00000000c38fb10] [c000000001154d40] napi_enable+0x30/0x60
[ 243.683921][ T123] [c00000000c38fb40] [c000000000f4ae94] ibmveth_open+0x68/0x5dc
[ 243.683928][ T123] [c00000000c38fbe0] [c000000000f4aa20] veth_pool_store+0x220/0x270
[ 243.683936][ T123] [c00000000c38fc70] [c000000000826278] sysfs_kf_write+0x68/0xb0
[ 243.683944][ T123] [c00000000c38fcb0] [c0000000008240b8] kernfs_fop_write_iter+0x198/0x2d0
[ 243.683951][ T123] [c00000000c38fd00] [c00000000071b9ac] vfs_write+0x34c/0x650
[ 243.683958][ T123] [c00000000c38fdc0] [c00000000071bea8] ksys_write+0x88/0x150
[ 243.683966][ T123] [c00000000c38fe10] [c0000000000317f4] system_call_exception+0x124/0x340
[ 243.683973][ T123] [c00000000c38fe50] [c00000000000d05c] system_call_vectored_common+0x15c/0x2ec
...
[ 243.684087][ T123] Showing all locks held in the system:
[ 243.684095][ T123] 1 lock held by khungtaskd/123:
[ 243.684099][ T123] #0: c00000000278e370 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x50/0x248
[ 243.684114][ T123] 4 locks held by stress.sh/4365:
[ 243.684119][ T123] #0: c00000003a4cd3f8 (sb_writers#3){.+.+}-{0:0}, at: ksys_write+0x88/0x150
[ 243.684132][ T123] #1: c000000041aea888 (&of->mutex#2){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x154/0x2d0
[ 243.684143][ T123] #2: c0000000366fb9a8 (kn->active#64){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x160/0x2d0
[ 243.684155][ T123] #3: c000000035ff4cb8 (&dev->lock){+.+.}-{3:3}, at: napi_enable+0x30/0x60
[ 243.684166][ T123] 5 locks held by stress.sh/4366:
[ 243.684170][ T123] #0: c00000003a4cd3f8 (sb_writers#3){.+.+}-{0:0}, at: ksys_write+0x88/0x150
[ 243.
---truncated--- | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-4287 | CWE-404 | PyTorch | PyTorch nccl.py torch.cuda.nccl.reduce denial of service | Low | null | 3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L | A problematic vulnerability has been identified in PyTorch version 2.6.0 with CUDA 12.4. The affected component is the torch.cuda.nccl.reduce function within the torch/cuda/nccl.py file. Exploitation of this vulnerability can lead to a denial-of-service condition. The attack can be launched from the local host. Public exploit code for this issue is currently available, increasing the potential for exploitation. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-05-05T21:00:49.968738+00:00 | 2025-05-05T20:00:11.130000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-32053 | CWE-126 | libsoup | Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L | A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read. | null | 2025-04-03T01:16:47.321000+00:00 | 2025-04-03T00:00:00+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.src",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.src",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64"
] | [
"red_hat_enterprise_linux_6:libsoup",
"red_hat_enterprise_linux_7:libsoup",
"red_hat_enterprise_linux_9:libsoup"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"No mitigation is currently available for this vulnerability.",
"Out of support scope",
"Affected"
] | [
"2025-05-06T15:43:33+00:00",
"2025-05-06T16:48:22+00:00",
"2025-05-06T16:03:20+00:00",
"2025-05-05T01:24:57+00:00",
null,
null,
null
] |
CVE-2025-2703 | CWE-79 | grafana | Cross-Site Scripting in Grafana XY Chart Panel | Moderate | null | 6.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N | A DOM-based Cross-site scripting vulnerability exists in Grafana's built-in XY Chart plugin. This flaw allows an attacker with editor-level privileges to inject and execute arbitrary JavaScript code by editing an XY Chart Panel. The vulnerability bypasses the Content Security Policy, allowing the script to execute when the chart is rendered. | This vulnerability is classified as a Moderate severity due to the ability of authenticated users with Editor permissions to inject arbitrary JavaScript into XY Chart panels. When the panel is rendered, the payload executes in the user's browser context, bypassing existing Content Security Policy (CSP) protections. This allows for potential session hijacking or data exfiltration. While the exploit requires some user privileges and interaction, the security boundary between trusted editors and secure rendering is violated.
It is important to note that this issue affects Grafana versions 11.1.0 and later, which are not included in any Red Hat supported builds. Therefore, Red Hat customers are not impacted by this vulnerability. | 2025-04-09T08:40:38.451000+00:00 | 2025-04-23T09:56:18.005000+00:00 | [] | [] | [
"red_hat_enterprise_linux_8:grafana",
"red_hat_enterprise_linux_9:grafana"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-21691 | CWE-863 | kernel | cachestat: fix page cache statistics permission checking | Moderate | null | 7.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
cachestat: fix page cache statistics permission checking
When the 'cachestat()' system call was added in commit cf264e1329fb
("cachestat: implement cachestat syscall"), it was meant to be a much
more convenient (and performant) version of mincore() that didn't need
mapping things into the user virtual address space in order to work.
But it ended up missing the "check for writability or ownership" fix for
mincore(), done in commit 134fca9063ad ("mm/mincore.c: make mincore()
more conservative").
This just adds equivalent logic to 'cachestat()', modified for the file
context (rather than vma). | null | 2025-02-10T00:00:00+00:00 | 2025-02-10T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2025-37745 | null | kernel | PM: hibernate: Avoid deadlock in hibernate_compressor_param_set() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()
syzbot reported a deadlock in lock_system_sleep() (see below).
The write operation to "/sys/module/hibernate/parameters/compressor"
conflicts with the registration of ieee80211 device, resulting in a deadlock
when attempting to acquire system_transition_mutex under param_lock.
To avoid this deadlock, change hibernate_compressor_param_set() to use
mutex_trylock() for attempting to acquire system_transition_mutex and
return -EBUSY when it fails.
Task flags need not be saved or adjusted before calling
mutex_trylock(&system_transition_mutex) because the caller is not going
to end up waiting for this mutex and if it runs concurrently with system
suspend in progress, it will be frozen properly when it returns to user
space.
syzbot report:
syz-executor895/5833 is trying to acquire lock:
ffffffff8e0828c8 (system_transition_mutex){+.+.}-{4:4}, at: lock_system_sleep+0x87/0xa0 kernel/power/main.c:56
but task is already holding lock:
ffffffff8e07dc68 (param_lock){+.+.}-{4:4}, at: kernel_param_lock kernel/params.c:607 [inline]
ffffffff8e07dc68 (param_lock){+.+.}-{4:4}, at: param_attr_store+0xe6/0x300 kernel/params.c:586
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #3 (param_lock){+.+.}-{4:4}:
__mutex_lock_common kernel/locking/mutex.c:585 [inline]
__mutex_lock+0x19b/0xb10 kernel/locking/mutex.c:730
ieee80211_rate_control_ops_get net/mac80211/rate.c:220 [inline]
rate_control_alloc net/mac80211/rate.c:266 [inline]
ieee80211_init_rate_ctrl_alg+0x18d/0x6b0 net/mac80211/rate.c:1015
ieee80211_register_hw+0x20cd/0x4060 net/mac80211/main.c:1531
mac80211_hwsim_new_radio+0x304e/0x54e0 drivers/net/wireless/virtual/mac80211_hwsim.c:5558
init_mac80211_hwsim+0x432/0x8c0 drivers/net/wireless/virtual/mac80211_hwsim.c:6910
do_one_initcall+0x128/0x700 init/main.c:1257
do_initcall_level init/main.c:1319 [inline]
do_initcalls init/main.c:1335 [inline]
do_basic_setup init/main.c:1354 [inline]
kernel_init_freeable+0x5c7/0x900 init/main.c:1568
kernel_init+0x1c/0x2b0 init/main.c:1457
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
-> #2 (rtnl_mutex){+.+.}-{4:4}:
__mutex_lock_common kernel/locking/mutex.c:585 [inline]
__mutex_lock+0x19b/0xb10 kernel/locking/mutex.c:730
wg_pm_notification drivers/net/wireguard/device.c:80 [inline]
wg_pm_notification+0x49/0x180 drivers/net/wireguard/device.c:64
notifier_call_chain+0xb7/0x410 kernel/notifier.c:85
notifier_call_chain_robust kernel/notifier.c:120 [inline]
blocking_notifier_call_chain_robust kernel/notifier.c:345 [inline]
blocking_notifier_call_chain_robust+0xc9/0x170 kernel/notifier.c:333
pm_notifier_call_chain_robust+0x27/0x60 kernel/power/main.c:102
snapshot_open+0x189/0x2b0 kernel/power/user.c:77
misc_open+0x35a/0x420 drivers/char/misc.c:179
chrdev_open+0x237/0x6a0 fs/char_dev.c:414
do_dentry_open+0x735/0x1c40 fs/open.c:956
vfs_open+0x82/0x3f0 fs/open.c:1086
do_open fs/namei.c:3830 [inline]
path_openat+0x1e88/0x2d80 fs/namei.c:3989
do_filp_open+0x20c/0x470 fs/namei.c:4016
do_sys_openat2+0x17a/0x1e0 fs/open.c:1428
do_sys_open fs/open.c:1443 [inline]
__do_sys_openat fs/open.c:1459 [inline]
__se_sys_openat fs/open.c:1454 [inline]
__x64_sys_openat+0x175/0x210 fs/open.c:1454
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
-> #1 ((pm_chain_head).rwsem){++++}-{4:4}:
down_read+0x9a/0x330 kernel/locking/rwsem.c:1524
blocking_notifier_call_chain_robust kerne
---truncated--- | null | 2025-05-01T00:00:00+00:00 | 2025-05-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-3406 | CWE-125 | stb | Nothings stb Header Array out-of-bounds read | Moderate | null | 4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N | A vulnerability was found in Nothings stb up to f056911. It has been classified as problematic. Affected is the function stbhw_build_tileset_from_image of the component Header Array Handler. The manipulation of the argument w leads to out-of-bounds read. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-04-08T04:00:43.954434+00:00 | 2025-04-08T03:31:12.145000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-22117 | null | kernel | ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
Fix using the untrusted value of proto->raw.pkt_len in function
ice_vc_fdir_parse_raw() by verifying if it does not exceed the
VIRTCHNL_MAX_SIZE_RAW_PACKET value. | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2025-22052 | null | kernel | staging: gpib: Fix Oops after disconnect in ni_usb | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
staging: gpib: Fix Oops after disconnect in ni_usb
If the usb dongle is disconnected subsequent calls to the
driver cause a NULL dereference Oops as the bus_interface
is set to NULL on disconnect.
This problem was introduced by setting usb_dev from the bus_interface
for dev_xxx messages.
Previously bus_interface was checked for NULL only in the the functions
directly calling usb_fill_bulk_urb or usb_control_msg.
Check for valid bus_interface on all interface entry points
and return -ENODEV if it is NULL. | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-32052 | CWE-126 | libsoup | Heap buffer overflow in sniff_unknown() | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L | A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read. | null | 2025-04-03T01:16:47.177000+00:00 | 2025-04-03T00:00:00+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.src",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.src",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64"
] | [
"red_hat_enterprise_linux_6:libsoup",
"red_hat_enterprise_linux_7:libsoup",
"red_hat_enterprise_linux_9:libsoup"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"No mitigation is currently available for this vulnerability.",
"Out of support scope",
"Affected"
] | [
"2025-05-06T15:43:33+00:00",
"2025-05-06T16:48:22+00:00",
"2025-05-06T16:03:20+00:00",
"2025-05-05T01:24:57+00:00",
null,
null,
null
] |
CVE-2025-21804 | CWE-121 | kernel | PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() | Low | null | 3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L | In the Linux kernel, the following vulnerability has been resolved:
PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
The rcar_pcie_parse_outbound_ranges() uses the devm_request_mem_region()
macro to request a needed resource. A string variable that lives on the
stack is then used to store a dynamically computed resource name, which
is then passed on as one of the macro arguments. This can lead to
undefined behavior.
Depending on the current contents of the memory, the manifestations of
errors may vary. One possible output may be as follows:
$ cat /proc/iomem
30000000-37ffffff :
38000000-3fffffff :
Sometimes, garbage may appear after the colon.
In very rare cases, if no NULL-terminator is found in memory, the system
might crash because the string iterator will overrun which can lead to
access of unmapped memory above the stack.
Thus, fix this by replacing outbound_name with the name of the previously
requested resource. With the changes applied, the output will be as
follows:
$ cat /proc/iomem
30000000-37ffffff : memory2
38000000-3fffffff : memory3
[kwilczynski: commit log] | null | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2025-2581 | CWE-191 | xmedcon | xmedcon DICOM File malloc integer underflow | Moderate | null | 4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L | A flaw was found in XMedCon. This vulnerability allows an attacker to trigger an integer underflow via manipulating the malloc function, potentially leading to memory corruption or denial of service. The attack can be launched remotely. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-03-21T06:00:53.508446+00:00 | 2025-03-21T05:00:22.250000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-30346 | CWE-444 | varnish | Client-Side Desynchronization in Varnish Cache | Moderate | null | 5.3/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N | A flaw was found in Varnish Cache and Varnish Enterprise. This vulnerability allows client-side desynchronization via crafted HTTP/1 requests. | null | 2025-03-21T07:00:55.725966+00:00 | 2025-03-21T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_8:varnish:6/varnish",
"red_hat_enterprise_linux_9:varnish"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-21941 | CWE-476 | kernel | drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
Null pointer dereference issue could occur when pipe_ctx->plane_state
is null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not
null before accessing. This prevents a null pointer dereference.
Found by code review.
(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092) | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-2240 | CWE-1325 | smallrye-fault-tolerance | SmallRye Fault Tolerance | Important | null | 7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue. | This vulnerability allows a remote attacker to cause an out-of-memory issue when calling the metrics URI, resulting in a denial of service. As this flaw can be triggered via the network, it has been rated with an important severity. | 2025-03-12T02:23:44.660000+00:00 | 2025-03-12T00:00:00+00:00 | [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15",
"Red Hat build of Apache Camel 4.8.5 for Spring Boot",
"Red Hat build of Quarkus 3.15.4"
] | [
"red_hat_build_of_apicurio_registry_2:io.smallrye/smallrye-fault-tolerance-core",
"red_hat_build_of_apicurio_registry_3:io.smallrye/smallrye-fault-tolerance-core",
"red_hat_fuse_7:io.smallrye/smallrye-fault-tolerance-core",
"red_hat_integration_camel_k_1:io.smallrye/smallrye-fault-tolerance-core"
] | [
"red_hat_build_of_quarkus:io.smallrye/smallrye-fault-tolerance-apiimpl",
"red_hat_jboss_enterprise_application_platform_7:io.smallrye/smallrye-fault-tolerance-core",
"red_hat_jboss_enterprise_application_platform_8:io.smallrye/smallrye-fault-tolerance-core",
"red_hat_jboss_enterprise_application_platform_expansion_pack:io.smallrye/smallrye-fault-tolerance-core"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\nThe References section of this erratum contains a download link (you must log in to download the update).",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"Out of support scope",
"Will not fix",
"Affected"
] | [
"2025-04-02T16:48:42+00:00",
"2025-04-02T20:19:22+00:00",
"2025-04-02T13:06:42+00:00",
null,
null,
null,
null
] |
CVE-2025-21783 | CWE-476 | kernel | gpiolib: Fix crash on error in gpiochip_get_ngpios() | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
gpiolib: Fix crash on error in gpiochip_get_ngpios()
The gpiochip_get_ngpios() uses chip_*() macros to print messages.
However these macros rely on gpiodev to be initialised and set,
which is not the case when called via bgpio_init(). In such a case
the printing messages will crash on NULL pointer dereference.
Replace chip_*() macros by the respective dev_*() ones to avoid
such crash. | null | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-21629 | null | kernel | net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets
The blamed commit disabled hardware offoad of IPv6 packets with
extension headers on devices that advertise NETIF_F_IPV6_CSUM,
based on the definition of that feature in skbuff.h:
* * - %NETIF_F_IPV6_CSUM
* - Driver (device) is only able to checksum plain
* TCP or UDP packets over IPv6. These are specifically
* unencapsulated packets of the form IPv6|TCP or
* IPv6|UDP where the Next Header field in the IPv6
* header is either TCP or UDP. IPv6 extension headers
* are not supported with this feature. This feature
* cannot be set in features for a device with
* NETIF_F_HW_CSUM also set. This feature is being
* DEPRECATED (see below).
The change causes skb_warn_bad_offload to fire for BIG TCP
packets.
[ 496.310233] WARNING: CPU: 13 PID: 23472 at net/core/dev.c:3129 skb_warn_bad_offload+0xc4/0xe0
[ 496.310297] ? skb_warn_bad_offload+0xc4/0xe0
[ 496.310300] skb_checksum_help+0x129/0x1f0
[ 496.310303] skb_csum_hwoffload_help+0x150/0x1b0
[ 496.310306] validate_xmit_skb+0x159/0x270
[ 496.310309] validate_xmit_skb_list+0x41/0x70
[ 496.310312] sch_direct_xmit+0x5c/0x250
[ 496.310317] __qdisc_run+0x388/0x620
BIG TCP introduced an IPV6_TLV_JUMBO IPv6 extension header to
communicate packet length, as this is an IPv6 jumbogram. But, the
feature is only enabled on devices that support BIG TCP TSO. The
header is only present for PF_PACKET taps like tcpdump, and not
transmitted by physical devices.
For this specific case of extension headers that are not
transmitted, return to the situation before the blamed commit
and support hardware offload.
ipv6_has_hopopt_jumbo() tests not only whether this header is present,
but also that it is the only extension header before a terminal (L4)
header. | null | 2025-01-15T00:00:00+00:00 | 2025-01-15T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2025-1179 | CWE-119 | binutils | GNU Binutils ld libbfd.c bfd_putl64 memory corruption | Moderate | null | 5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L | A flaw was found in GNU Binutils. This vulnerability allows memory corruption via manipulation of the bfd_putl64 function. | null | 2025-02-11T08:00:45.291258+00:00 | 2025-02-11T07:00:10.602000+00:00 | [] | [
"red_hat_enterprise_linux_9:mingw-binutils"
] | [
"red_hat_enterprise_linux_6:binutils",
"red_hat_enterprise_linux_7:binutils",
"red_hat_enterprise_linux_7:gdb",
"red_hat_enterprise_linux_8:binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_8:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-14-gdb",
"red_hat_enterprise_linux_8:gdb",
"red_hat_enterprise_linux_8:mingw-binutils",
"red_hat_enterprise_linux_9:binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_9:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_9:gdb"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-32906 | CWE-125 | libsoup | Out of bounds reads in soup_headers_parse_request() | Important | null | 7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. | null | 2025-04-14T01:27:05.130000+00:00 | 2025-04-14T00:00:00+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.src",
"AppStream-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.i686",
"AppStream-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.src",
"AppStream-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.src",
"AppStream-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.ppc64le",
"AppStream-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.src",
"AppStream-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"AppStream-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.src",
"AppStream-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.src",
"AppStream-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.aarch64",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.ppc64le",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.s390x",
"AppStream-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.src",
"AppStream-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"AppStream-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:libsoup-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-debuginfo-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-debugsource-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:libsoup-devel-0:2.72.0-8.el9_0.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.src",
"AppStream-9.2.0.Z.EUS:libsoup-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.aarch64",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.i686",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.s390x",
"AppStream-9.2.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_2.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.src",
"AppStream-9.4.0.Z.EUS:libsoup-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debuginfo-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-debugsource-0:2.72.0-8.el9_4.4.x86_64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.aarch64",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.i686",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.s390x",
"AppStream-9.4.0.Z.EUS:libsoup-devel-0:2.72.0-8.el9_4.4.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debuginfo-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-debugsource-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libsoup-devel-0:2.62.3-8.el8_10.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.src",
"BaseOS-8.2.0.Z.AUS:libsoup-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-debuginfo-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-debugsource-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:libsoup-devel-0:2.62.3-1.el8_2.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.src",
"BaseOS-8.4.0.Z.AUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.src",
"BaseOS-8.4.0.Z.E4S:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.ppc64le",
"BaseOS-8.4.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.src",
"BaseOS-8.4.0.Z.TUS:libsoup-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.i686",
"BaseOS-8.4.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_4.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.src",
"BaseOS-8.6.0.Z.AUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.src",
"BaseOS-8.6.0.Z.E4S:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.src",
"BaseOS-8.6.0.Z.TUS:libsoup-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-debuginfo-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-debugsource-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:libsoup-devel-0:2.62.3-2.el8_6.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.src",
"BaseOS-8.8.0.Z.EUS:libsoup-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debuginfo-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-debugsource-0:2.62.3-3.el8_8.4.x86_64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.aarch64",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.i686",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.ppc64le",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.s390x",
"BaseOS-8.8.0.Z.EUS:libsoup-devel-0:2.62.3-3.el8_8.4.x86_64"
] | [
"red_hat_enterprise_linux_6:libsoup",
"red_hat_enterprise_linux_7:libsoup",
"red_hat_enterprise_linux_9:libsoup"
] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Currently, no mitigation was found for this vulnerability.",
"Out of support scope",
"Affected"
] | [
"2025-05-06T15:43:33+00:00",
"2025-05-06T13:53:30+00:00",
"2025-05-07T04:31:24+00:00",
"2025-05-07T07:04:14+00:00",
"2025-05-06T16:48:22+00:00",
"2025-05-05T01:17:42+00:00",
"2025-05-06T16:03:20+00:00",
"2025-05-05T01:24:57+00:00",
null,
null,
null
] |
CVE-2025-22005 | CWE-401 | kernel | ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw(). | Moderate | null | 6.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L | In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
fib_check_nh_v6_gw() expects that fib6_nh_init() cleans up everything
when it fails.
Commit 7dd73168e273 ("ipv6: Always allocate pcpu memory in a fib6_nh")
moved fib_nh_common_init() before alloc_percpu_gfp() within fib6_nh_init()
but forgot to add cleanup for fib6_nh->nh_common.nhc_pcpu_rth_output in
case it fails to allocate fib6_nh->rt6i_pcpu, resulting in memleak.
Let's call fib_nh_common_release() and clear nhc_pcpu_rth_output in the
error path.
Note that we can remove the fib6_nh_release() call in nh_create_ipv6()
later in net-next.git. | null | 2025-04-03T00:00:00+00:00 | 2025-04-03T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-21500 | null | mysql | Optimizer unspecified vulnerability (CPU Jan 2025) | Moderate | null | 6.7/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | null | 2025-01-21T21:06:54.583473+00:00 | 2025-01-21T20:52:55.678000+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
"CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
] | [] | [
"red_hat_enterprise_linux_6:mysql"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258"
] | [
"2025-02-19T11:10:11+00:00",
"2025-02-19T10:31:41+00:00"
] |
CVE-2025-0441 | null | chromium-browser | Inappropriate implementation in Fenced Frames | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | Inappropriate implementation in Fenced Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to obtain potentially sensitive information from the system via a crafted HTML page. (Chromium security severity: Medium) | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-01-15T12:01:51.513975+00:00 | 2025-01-15T10:58:53.709000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-26695 | CWE-203 | thunderbird | Downloading of OpenPGP keys from WKD used incorrect padding | Low | null | 4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N | A flaw was found in Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: When requesting an OpenPGP key from a WKD server, an incorrect padding size was used, and a network observer could have learned the length of the requested email address. | Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory. | 2025-03-10T19:00:49.099739+00:00 | 2025-03-10T18:41:25.460000+00:00 | [] | [
"red_hat_enterprise_linux_6:thunderbird",
"red_hat_enterprise_linux_7:thunderbird",
"red_hat_enterprise_linux_8:thunderbird",
"red_hat_enterprise_linux_9:thunderbird",
"red_hat_enterprise_linux_9:thunderbird-flatpak-container"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2025-4052 | null | chromium-browser | Inappropriate implementation in DevTools in Google Chrome | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Low) | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-05-05T19:01:00.470002+00:00 | 2025-05-05T18:10:37.534000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2025-21853 | CWE-833 | kernel | bpf: avoid holding freeze_mutex during mmap operation | Moderate | null | 5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
bpf: avoid holding freeze_mutex during mmap operation
We use map->freeze_mutex to prevent races between map_freeze() and
memory mapping BPF map contents with writable permissions. The way we
naively do this means we'll hold freeze_mutex for entire duration of all
the mm and VMA manipulations, which is completely unnecessary. This can
potentially also lead to deadlocks, as reported by syzbot in [0].
So, instead, hold freeze_mutex only during writeability checks, bump
(proactively) "write active" count for the map, unlock the mutex and
proceed with mmap logic. And only if something went wrong during mmap
logic, then undo that "write active" counter increment.
[0] https://lore.kernel.org/bpf/[email protected]/ | null | 2025-03-12T00:00:00+00:00 | 2025-03-12T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2025-27591 | CWE-732 | below | Privilege Escalation in Below via World-Writable Directory | Important | null | 7.9/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | A flaw was found in the Below service. This vulnerability allows local, unprivileged users to escalate to root privileges via symlink attacks exploiting a world-writable directory at /var/log/below. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-03-12T09:03:48.814133+00:00 | 2025-03-11T18:29:21.569000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"workaround"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
] | [
null
] |
CVE-2025-21916 | null | kernel | usb: atm: cxacru: fix a flaw in existing endpoint checks | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
usb: atm: cxacru: fix a flaw in existing endpoint checks
Syzbot once again identified a flaw in usb endpoint checking, see [1].
This time the issue stems from a commit authored by me (2eabb655a968
("usb: atm: cxacru: fix endpoint checking in cxacru_bind()")).
While using usb_find_common_endpoints() may usually be enough to
discard devices with wrong endpoints, in this case one needs more
than just finding and identifying the sufficient number of endpoints
of correct types - one needs to check the endpoint's address as well.
Since cxacru_bind() fills URBs with CXACRU_EP_CMD address in mind,
switch the endpoint verification approach to usb_check_XXX_endpoints()
instead to fix incomplete ep testing.
[1] Syzbot report:
usb 5-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 0 PID: 1378 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503
...
RIP: 0010:usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503
...
Call Trace:
<TASK>
cxacru_cm+0x3c8/0xe50 drivers/usb/atm/cxacru.c:649
cxacru_card_status drivers/usb/atm/cxacru.c:760 [inline]
cxacru_bind+0xcf9/0x1150 drivers/usb/atm/cxacru.c:1223
usbatm_usb_probe+0x314/0x1d30 drivers/usb/atm/usbatm.c:1058
cxacru_usb_probe+0x184/0x220 drivers/usb/atm/cxacru.c:1377
usb_probe_interface+0x641/0xbb0 drivers/usb/core/driver.c:396
really_probe+0x2b9/0xad0 drivers/base/dd.c:658
__driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800
driver_probe_device+0x50/0x430 drivers/base/dd.c:830
... | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-4382 | CWE-306 | grub2 | grub allow access to encrypted device through CLI once root device is unlocked via TPM | Moderate | null | 5.9/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N | A flaw was found in systems utilizing LUKS-encrypted disks with GRUB configured for TPM-based auto-decryption. When GRUB is set to automatically decrypt disks using keys stored in the TPM, it reads the decryption key into system memory. If an attacker with physical access can corrupt the underlying filesystem superblock, GRUB will fail to locate a valid filesystem and enter rescue mode. At this point, the disk is already decrypted, and the decryption key remains loaded in system memory. This scenario may allow an attacker with physical access to access the unencrypted data without any further authentication, thereby compromising data confidentiality. Furthermore, the ability to force this state through filesystem corruption also presents a data integrity concern. | This vulnerability was classified as Moderate severity by the Red Hat Product Security. For a successful attack to take place, the attacker needs to have physical access to the system and enough privileges to edit sensitive metadata in the filesystem contained in the grub's root device. | 2025-05-06T14:24:53.960000+00:00 | 2025-05-08T23:59:00+00:00 | [] | [
"red_hat_enterprise_linux_7:grub2",
"red_hat_enterprise_linux_8:grub2",
"red_hat_enterprise_linux_9:grub2",
"red_hat_openshift_container_platform_4:rhcos"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2025-1180 | CWE-119 | binutils | GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption | Low | null | 3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L | A flaw was found in GNU Binutils. This vulnerability allows memory corruption via manipulation of the _bfd_elf_write_section_eh_frame function. | null | 2025-02-11T08:00:50.378614+00:00 | 2025-02-11T07:31:06.853000+00:00 | [] | [
"red_hat_enterprise_linux_9:mingw-binutils"
] | [
"red_hat_enterprise_linux_6:binutils",
"red_hat_enterprise_linux_7:binutils",
"red_hat_enterprise_linux_7:gdb",
"red_hat_enterprise_linux_8:binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_8:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_8:gcc-toolset-14-gdb",
"red_hat_enterprise_linux_8:gdb",
"red_hat_enterprise_linux_8:mingw-binutils",
"red_hat_enterprise_linux_9:binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-binutils",
"red_hat_enterprise_linux_9:gcc-toolset-13-gdb",
"red_hat_enterprise_linux_9:gcc-toolset-14-binutils",
"red_hat_enterprise_linux_9:gdb"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-22013 | CWE-99 | kernel | KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
There are several problems with the way hyp code lazily saves the host's
FPSIMD/SVE state, including:
* Host SVE being discarded unexpectedly due to inconsistent
configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to
result in QEMU crashes where SVE is used by memmove(), as reported by
Eric Auger:
https://issues.redhat.com/browse/RHEL-68997
* Host SVE state is discarded *after* modification by ptrace, which was an
unintentional ptrace ABI change introduced with lazy discarding of SVE state.
* The host FPMR value can be discarded when running a non-protected VM,
where FPMR support is not exposed to a VM, and that VM uses
FPSIMD/SVE. In these cases the hyp code does not save the host's FPMR
before unbinding the host's FPSIMD/SVE/SME state, leaving a stale
value in memory.
Avoid these by eagerly saving and "flushing" the host's FPSIMD/SVE/SME
state when loading a vCPU such that KVM does not need to save any of the
host's FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is
removed and the necessary call to fpsimd_save_and_flush_cpu_state() is
placed in kvm_arch_vcpu_load_fp(). As 'fpsimd_state' and 'fpmr_ptr'
should not be used, they are set to NULL; all uses of these will be
removed in subsequent patches.
Historical problems go back at least as far as v5.17, e.g. erroneous
assumptions about TIF_SVE being clear in commit:
8383741ab2e773a9 ("KVM: arm64: Get rid of host SVE tracking/saving")
... and so this eager save+flush probably needs to be backported to ALL
stable trees. | null | 2025-04-08T00:00:00+00:00 | 2025-04-08T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2025-32910 | CWE-476 | libsoup | Null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an Unauthorized response with Digest authentication | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash. | This vulnerability is currently considered Moderate as this may only affect the client HTTP side. | 2025-04-14T01:21:00.292000+00:00 | 2025-04-14T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:libsoup",
"red_hat_enterprise_linux_7:libsoup",
"red_hat_enterprise_linux_8:libsoup",
"red_hat_enterprise_linux_9:libsoup"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"Currently, no mitigation is available for this vulnerability.",
"Out of support scope",
"Will not fix",
"Affected"
] | [
null,
null,
null,
null
] |
CVE-2025-21795 | CWE-99 | kernel | NFSD: fix hang in nfsd4_shutdown_callback | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
NFSD: fix hang in nfsd4_shutdown_callback
If nfs4_client is in courtesy state then there is no point to send
the callback. This causes nfsd4_shutdown_callback to hang since
cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP
notifies NFSD that the connection was dropped.
This patch modifies nfsd4_run_cb_work to skip the RPC call if
nfs4_client is in courtesy state. | null | 2025-02-27T00:00:00+00:00 | 2025-02-27T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Will not fix",
"Affected"
] | [
null,
null,
null
] |
CVE-2025-21845 | CWE-99 | kernel | mtd: spi-nor: sst: Fix SST write failure | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
mtd: spi-nor: sst: Fix SST write failure
'commit 18bcb4aa54ea ("mtd: spi-nor: sst: Factor out common write operation
to `sst_nor_write_data()`")' introduced a bug where only one byte of data
is written, regardless of the number of bytes passed to
sst_nor_write_data(), causing a kernel crash during the write operation.
Ensure the correct number of bytes are written as passed to
sst_nor_write_data().
Call trace:
[ 57.400180] ------------[ cut here ]------------
[ 57.404842] While writing 2 byte written 1 bytes
[ 57.409493] WARNING: CPU: 0 PID: 737 at drivers/mtd/spi-nor/sst.c:187 sst_nor_write_data+0x6c/0x74
[ 57.418464] Modules linked in:
[ 57.421517] CPU: 0 UID: 0 PID: 737 Comm: mtd_debug Not tainted 6.12.0-g5ad04afd91f9 #30
[ 57.429517] Hardware name: Xilinx Versal A2197 Processor board revA - x-prc-02 revA (DT)
[ 57.437600] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 57.444557] pc : sst_nor_write_data+0x6c/0x74
[ 57.448911] lr : sst_nor_write_data+0x6c/0x74
[ 57.453264] sp : ffff80008232bb40
[ 57.456570] x29: ffff80008232bb40 x28: 0000000000010000 x27: 0000000000000001
[ 57.463708] x26: 000000000000ffff x25: 0000000000000000 x24: 0000000000000000
[ 57.470843] x23: 0000000000010000 x22: ffff80008232bbf0 x21: ffff000816230000
[ 57.477978] x20: ffff0008056c0080 x19: 0000000000000002 x18: 0000000000000006
[ 57.485112] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80008232b580
[ 57.492246] x14: 0000000000000000 x13: ffff8000816d1530 x12: 00000000000004a4
[ 57.499380] x11: 000000000000018c x10: ffff8000816fd530 x9 : ffff8000816d1530
[ 57.506515] x8 : 00000000fffff7ff x7 : ffff8000816fd530 x6 : 0000000000000001
[ 57.513649] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
[ 57.520782] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0008049b0000
[ 57.527916] Call trace:
[ 57.530354] sst_nor_write_data+0x6c/0x74
[ 57.534361] sst_nor_write+0xb4/0x18c
[ 57.538019] mtd_write_oob_std+0x7c/0x88
[ 57.541941] mtd_write_oob+0x70/0xbc
[ 57.545511] mtd_write+0x68/0xa8
[ 57.548733] mtdchar_write+0x10c/0x290
[ 57.552477] vfs_write+0xb4/0x3a8
[ 57.555791] ksys_write+0x74/0x10c
[ 57.559189] __arm64_sys_write+0x1c/0x28
[ 57.563109] invoke_syscall+0x54/0x11c
[ 57.566856] el0_svc_common.constprop.0+0xc0/0xe0
[ 57.571557] do_el0_svc+0x1c/0x28
[ 57.574868] el0_svc+0x30/0xcc
[ 57.577921] el0t_64_sync_handler+0x120/0x12c
[ 57.582276] el0t_64_sync+0x190/0x194
[ 57.585933] ---[ end trace 0000000000000000 ]---
[[email protected]: add Cc stable tag] | null | 2025-03-12T00:00:00+00:00 | 2025-03-12T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2025-0904 | null | PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | null | null | null | PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25422. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2025-01-30T20:36:25.107000+00:00 | 2025-01-31T22:08:40.655000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2025-24201 | CWE-787 | webkitgtk | out-of-bounds write vulnerability | Important | null | 7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox. | This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example. | 2025-03-12T22:35:00.430000+00:00 | 2025-03-11T00:00:00+00:00 | [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_2.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.src",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.i686",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.x86_64"
] | [
"red_hat_enterprise_linux_6:webkitgtk",
"red_hat_enterprise_linux_7:webkitgtk3",
"red_hat_enterprise_linux_7:webkitgtk4"
] | [] | [] | [
"exploit_status",
"impact"
] | [
"CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"Important"
] | [
"2025-03-13T00:00:00+00:00",
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"Out of support scope",
"Will not fix",
"Affected"
] | [
"2025-03-17T01:43:28+00:00",
"2025-03-18T08:17:23+00:00",
"2025-03-18T09:12:48+00:00",
"2025-03-19T03:47:41+00:00",
"2025-03-18T03:29:42+00:00",
"2025-03-18T05:22:27+00:00",
"2025-03-18T07:44:23+00:00",
"2025-03-18T02:28:37+00:00",
null,
null,
null,
null
] |
CVE-2025-21900 | CWE-667 | kernel | NFSv4: Fix a deadlock when recovering state on a sillyrenamed file | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
NFSv4: Fix a deadlock when recovering state on a sillyrenamed file
If the file is sillyrenamed, and slated for delete on close, it is
possible for a server reboot to triggeer an open reclaim, with can again
race with the application call to close(). When that happens, the call
to put_nfs_open_context() can trigger a synchronous delegreturn call
which deadlocks because it is not marked as privileged.
Instead, ensure that the call to nfs4_inode_return_delegation_on_close()
catches the delegreturn, and schedules it asynchronously. | null | 2025-04-01T00:00:00+00:00 | 2025-04-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2025-25294 | CWE-117 | envoyproxy/gateway | Envoy Gateway Log Injection Vulnerability | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N | A log injection vulnerability was found in Envoy Gateway. In affected versions where a default Envoy Proxy access log configuration is used, an attacker may be able use a specially crafted user-agent to perform json injection. This can allow the attacker to modify the access log. | null | 2025-03-06T19:00:50.394435+00:00 | 2025-03-06T18:46:23.913000+00:00 | [] | [
"red_hat_connectivity_link:rhcl-operator-bundle-container",
"red_hat_connectivity_link:rhcl-operator-container"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available",
"none_available"
] | [
"Fix deferred",
"Affected"
] | [
null,
null
] |
CVE-2025-22101 | null | kernel | net: libwx: fix Tx L4 checksum | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: libwx: fix Tx L4 checksum
The hardware only supports L4 checksum offload for TCP/UDP/SCTP protocol.
There was a bug to set Tx checksum flag for the other protocol that results
in Tx ring hang. Fix to compute software checksum for these packets. | null | 2025-04-16T00:00:00+00:00 | 2025-04-16T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.