CVE-2025-66382
Severity: low
Released on: 28/11/2025
Advisory:
Bugzilla: 2417661
Bugzilla Description:
libexpat: libexpat: Denial of service via crafted file processing
CVSS Score:
CVSSv3 Score: 2.9
Vector:
CWE: CWE-407
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-13699
Severity: important
Released on: 27/11/2025
Advisory:
Bugzilla: 2417693
Bugzilla Description:
mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-64344
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417421
Bugzilla Description:
Suricata: Suricata: Stack overflow in Lua scripts due to large buffers
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-121
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64330
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417413
Bugzilla Description:
Suricata: Suricata: Single byte read heap overflow leads to denial of service
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-122
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64331
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417415
Bugzilla Description:
Suricata: Suricata: Stack overflow vulnerability in HTTP processing leads to denial of service
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-121
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64332
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417410
Bugzilla Description:
Suricata: Suricata: Denial of service via SWF decompression
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-121
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64333
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417395
Bugzilla Description:
Suricata: Suricata: Stack Overflow Vulnerability via Large HTTP Content Type Logging
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-121
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64334
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417387
Bugzilla Description:
Suricata: Suricata: Unbounded memory growth via compressed HTTP data
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-62593
Severity: important
Released on: 26/11/2025
Advisory:
Bugzilla: 2417394
Bugzilla Description:
ray: Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2021-4472
Severity: moderate
Released on: 26/11/2025
Advisory:
Bugzilla: 2417321
Bugzilla Description:
python-mistralclient: mistral-dashboard: Local file inclusion through the 'Create Workbook' feature
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,
Full Details
CVE document
CVE-2025-13674
Severity: moderate
Released on: 26/11/2025
Advisory:
Bugzilla: 2417250
Bugzilla Description:
Wireshark: Wireshark: BPv7 dissector crash leads to denial of service
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-59820
Severity: moderate
Released on: 26/11/2025
Advisory:
Bugzilla: 2417216
Bugzilla Description:
Krita: Krita: Heap-based buffer overflow via manipulated TGA file
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-1284
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13502
Severity: important
Released on: 25/11/2025
Advisory:
Bugzilla: 2416300
Bugzilla Description:
webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: (CWE-125|CWE-190)
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13467
Severity: moderate
Released on: 25/11/2025
Advisory: RHSA-2025:22091, RHSA-2025:22090, RHSA-2025:22089, RHSA-2025:22088,
Bugzilla: 2416038
Bugzilla Description:
org.keycloak.storage.ldap: Keycloak: Deserialization of Untrusted Data in LDAP User Federation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-502
Affected Packages: keycloak,rhbk/keycloak-operator-bundle:26.2.11-1,rhbk/keycloak-rhel9-operator:26.4-5,rhbk/keycloak-operator-bundle:26.4.6-1,rhbk/keycloak-rhel9-operator:26.2-12,rhbk/keycloak-rhel9:26.2-12,rhbk/keycloak-rhel9:26.4-6,
Package States:
Full Details
CVE document
CVE-2025-65018
Severity: important
Released on: 24/11/2025
Advisory:
Bugzilla: 2416907
Bugzilla Description:
libpng: LIBPNG heap buffer overflow
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: (CWE-122|CWE-787)
Affected Packages:
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 21,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-64720
Severity: important
Released on: 24/11/2025
Advisory:
Bugzilla: 2416904
Bugzilla Description:
libpng: LIBPNG buffer overflow
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 21,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-64506
Severity: moderate
Released on: 24/11/2025
Advisory:
Bugzilla: 2416906
Bugzilla Description:
libpng: LIBPNG heap buffer over-read
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 21,Red Hat build of OpenJDK 21,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-13609
Severity: important
Released on: 24/11/2025
Advisory:
Bugzilla: 2416761
Bugzilla Description:
keylime: Keylime: Registrar allows identity takeover via duplicate UUID registration
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-694
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13601
Severity: moderate
Released on: 24/11/2025
Advisory:
Bugzilla: 2416741
Bugzilla Description:
glib: Integer overflow in in g_escape_uri_string()
CVSS Score:
CVSSv3 Score: 7.7
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-40212
Severity: important
Released on: 24/11/2025
Advisory:
Bugzilla: 2416750
Bugzilla Description:
kernel: nfsd: fix refcount leak in nfsd_set_fh_dentry()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40213
Severity:
Released on: 24/11/2025
Advisory:
Bugzilla: 2416793
Bugzilla Description:
kernel: Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-65106
Severity: important
Released on: 21/11/2025
Advisory:
Bugzilla: 2416504
Bugzilla Description:
langchain-core: LangChain Vulnerable to Template Injection via Attribute Access in Prompt Templates
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-1336
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-62609
Severity: moderate
Released on: 21/11/2025
Advisory:
Bugzilla: 2416469
Bugzilla Description:
mlx: MLX has Wild Pointer Dereference in load_gguf()
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,
Full Details
CVE document
CVE-2025-62608
Severity: moderate
Released on: 21/11/2025
Advisory:
Bugzilla: 2416470
Bugzilla Description:
mlx: MLX has heap-buffer-overflow in load()
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-122
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,
Full Details
CVE document
CVE-2025-13470
Severity: important
Released on: 21/11/2025
Advisory:
Bugzilla: 2416402
Bugzilla Description:
RNP: RNP: Confidentiality compromise due to uninitialized symmetric session key in Public-Key Encrypted Session Key (PKESK) packets
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-330
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13499
Severity: important
Released on: 21/11/2025
Advisory:
Bugzilla: 2416293
Bugzilla Description:
wireshark: Access of Uninitialized Pointer in Wireshark
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-62372
Severity: moderate
Released on: 21/11/2025
Advisory:
Bugzilla: 2416280
Bugzilla Description:
vllm: vLLM vulnerable to DoS with incorrect shape of multimodal embedding inputs
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-129
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-62426
Severity: moderate
Released on: 21/11/2025
Advisory:
Bugzilla: 2416278
Bugzilla Description:
vllm: vLLM vulnerable to DoS via large Chat Completion or Tokenization requests with specially crafted `chat_template_kwargs`
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-62164
Severity: important
Released on: 21/11/2025
Advisory:
Bugzilla: 2416282
Bugzilla Description:
vllm: VLLM deserialization vulnerability leading to DoS and potential RCE
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: (CWE-123|CWE-20|CWE-502|CWE-787)
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-40210
Severity: moderate
Released on: 21/11/2025
Advisory:
Bugzilla: 2416307
Bugzilla Description:
kernel: Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND"
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40209
Severity:
Released on: 21/11/2025
Advisory:
Bugzilla: 2416308
Bugzilla Description:
kernel: btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40211
Severity: moderate
Released on: 21/11/2025
Advisory:
Bugzilla: 2416309
Bugzilla Description:
kernel: ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-64524
Severity: low
Released on: 20/11/2025
Advisory:
Bugzilla: 2414780
Bugzilla Description:
cups-filters: cups-filters: Heap Buffer Overflow in rastertopclx
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13437
Severity: moderate
Released on: 20/11/2025
Advisory:
Bugzilla: 2416152
Bugzilla Description:
zx: Arbitrary node_modules Directory Deletion in Google zx
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-706
Affected Packages:
Package States: Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-13425
Severity: low
Released on: 20/11/2025
Advisory:
Bugzilla: 2416139
Bugzilla Description:
github.com/google/osv-scalibr: Denial of Service in OSV-SCALIBR
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document
CVE-2023-43000
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416324
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43392
Severity: moderate
Released on: 20/11/2025
Advisory:
Bugzilla: 2416325
Bugzilla Description:
webkitgtk: A website may exfiltrate image data cross-origin
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43419
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416326
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43425
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416327
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43427
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416329
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43429
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416330
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43430
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416331
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43431
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416332
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to memory corruption
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43432
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416334
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43434
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416335
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43440
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416336
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43443
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416337
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43480
Severity: moderate
Released on: 20/11/2025
Advisory:
Bugzilla: 2416338
Bugzilla Description:
webkitgtk: A malicious website may exfiltrate data cross-origin
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43421
Severity: important
Released on: 20/11/2025
Advisory:
Bugzilla: 2416355
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-65015
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2415784
Bugzilla Description:
joserfc: joserfc: Arbitrarily large JWT payloads in logs via exception messages
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-770
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64324
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2415776
Bugzilla Description:
kubevirt.io/kubevirt: KubeVirt: Arbitrary file read/write and privilege escalation via hostDisk feature
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: (CWE-200|CWE-732)
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,
Full Details
CVE document
CVE-2025-10158
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2415637
Bugzilla Description:
rsync: Rsync: Out of bounds array access via negative index
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-129
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-54770
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2413813
Bugzilla Description:
grub2: Use-after-free in net_set_vlan
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-54771
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2413823
Bugzilla Description:
grub2: Use-after-free in grub_file_close()
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61661
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2413827
Bugzilla Description:
grub2: grub2: Out-of-bounds write via malicious USB device
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61662
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2414683
Bugzilla Description:
grub2: Missing unregister call for gettext command may lead to use-after-free
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61663
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2414684
Bugzilla Description:
grub2: Missing unregister call for normal commands may lead to use-after-free
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61664
Severity: moderate
Released on: 18/11/2025
Advisory:
Bugzilla: 2414685
Bugzilla Description:
grub2: Missing unregister call for normal_exit command may lead to use-after-free
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-13228
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415521
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13230
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415522
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13229
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415527
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13227
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415525
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13226
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415526
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13224
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415524
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13223
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415523
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-65073
Severity: important
Released on: 17/11/2025
Advisory:
Bugzilla: 2415344
Bugzilla Description:
openstack-keystone: OpenStack Keystone: Unauthorized access and privilege escalation via AWS signature validation flaw
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-863
Affected Packages:
Package States: Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,
Full Details
CVE document
CVE-2025-13204
Severity: important
Released on: 14/11/2025
Advisory:
Bugzilla: 2415051
Bugzilla Description:
expr-eval: expr-eval: Prototype Pollution
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-915
Affected Packages:
Package States: Red Hat Enterprise Linux 8,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,
Full Details
CVE document
CVE-2025-13107
Severity: low
Released on: 14/11/2025
Advisory:
Bugzilla: 2414975
Bugzilla Description:
chromium-browser: Inappropriate implementation in Compositing
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-1021
Affected Packages:
Package States:
Full Details
CVE document
CVE-2024-13178
Severity: moderate
Released on: 14/11/2025
Advisory:
Bugzilla: 2414977
Bugzilla Description:
chromium-browser: Inappropriate implementation in Fullscreen
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-440
Affected Packages:
Package States:
Full Details
CVE document
CVE-2024-7017
Severity: important
Released on: 14/11/2025
Advisory:
Bugzilla: 2414978
Bugzilla Description:
chromium-browser: Inappropriate implementation in DevTools
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-250
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-13097
Severity: moderate
Released on: 14/11/2025
Advisory:
Bugzilla: 2414972
Bugzilla Description:
chromium-browser: Inappropriate implementation in DevTools
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-266
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-9479
Severity: moderate
Released on: 14/11/2025
Advisory:
Bugzilla: 2414973
Bugzilla Description:
chromium-browser: Out of bounds read in V8
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-47913
Severity: important
Released on: 13/11/2025
Advisory:
Bugzilla: 2414943
Bugzilla Description:
golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,Multicluster Engine for Kubernetes,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Trusted Artifact Signer,
Full Details
CVE document
CVE-2025-59840
Severity: important
Released on: 13/11/2025
Advisory:
Bugzilla: 2414907
Bugzilla Description:
vega: vega-expression: vega-interpreter: Cross-Site Scripting (XSS) via expressions abusing toString calls in environments using the VEGA_DEBUG global variable
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document
CVE-2025-11538
Severity: moderate
Released on: 13/11/2025
Advisory: RHSA-2025:21370, RHSA-2025:21371,
Bugzilla: 2402622
Bugzilla Description:
keycloak-server: Debug default bind address
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-1327
Affected Packages: rhbk/keycloak-rhel9,rhbk/keycloak-operator-bundle:26.4.4-1,rhbk/keycloak-rhel9-operator:26.4-3,rhbk/keycloak-rhel9:26.4-3,
Package States:
Full Details
CVE document
CVE-2025-12817
Severity: low
Released on: 13/11/2025
Advisory:
Bugzilla: 2414825
Bugzilla Description:
postgresql: CREATE STATISTICS does not check for schema CREATE privilege
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-862
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-12818
Severity: moderate
Released on: 13/11/2025
Advisory:
Bugzilla: 2414826
Bugzilla Description:
postgresql: libpq undersizes allocations, via integer wraparound
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-64429
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414694
Bugzilla Description:
duckdb: Encryption Crypto implementation is vulnerable
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-327
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-64345
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414696
Bugzilla Description:
wasmtime: Wasmtime unsound API access to shared linear memory
CVSS Score:
CVSSv3 Score: 1.8
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Connectivity Link 1,
Full Details
CVE document
CVE-2025-61667
Severity: important
Released on: 12/11/2025
Advisory:
Bugzilla: 2414630
Bugzilla Description:
github.com/DataDog/datadog-agent: Datadog Linux Host Agent local privilege escalation
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-13042
Severity: important
Released on: 12/11/2025
Advisory:
Bugzilla: 2414594
Bugzilla Description:
chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-763
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-37734
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414471
Bugzilla Description:
kibana: Kibana: Origin Validation Error leads to Server-Side Request Forgery
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-346
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document
CVE-2024-47866
Severity: important
Released on: 12/11/2025
Advisory: RHSA-2025:21203, RHSA-2025:21068,
Bugzilla: 2392386
Bugzilla Description:
rgw: RGW DoS attack with empty HTTP header in S3 object copy
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-20
Affected Packages: rhceph/rhceph-8-rhel9:sha256:9dc1093abd38598f8ec7433ce3ae1ade0f771d093c76739dbe84569763511f62,ceph-2:19.2.1-292.el9cp,
Package States: Red Hat Ceph Storage 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 9,
Full Details
CVE document
CVE-2025-59088
Severity: important
Released on: 12/11/2025
Advisory: RHSA-2025:21820, RHSA-2025:21138, RHSA-2025:21821, RHSA-2025:21139, RHSA-2025:21819, RHSA-2025:21140, RHSA-2025:21141, RHSA-2025:21806, RHSA-2025:21142, RHSA-2025:21818, RHSA-2025:21448, RHSA-2025:21748,
Bugzilla: 2393955
Bugzilla Description:
python-kdcproxy: Unauthenticated SSRF via Realm‑Controlled DNS SRV
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-918
Affected Packages: idm:client-8100020251103113748.143e9e98,python-kdcproxy-0:1.0.0-7.el9_0.1,python-kdcproxy-0:1.0.0-7.el9_2.1,python-kdcproxy-0:1.0.0-7.el9_4.1,idm:DL1-8080020251029082621.b0a6ceea,idm:DL1-8060020251030180424.ada582f1,idm:DL1-8100020251028161822.823393f5,python-kdcproxy-0:1.0.0-9.el9_6,python-kdcproxy-0:1.0.0-9.el9_7,python-kdcproxy-0:1.0.0-19.el10_0,python-kdcproxy-0:1.0.0-19.el10_1,idm:DL1-8020020251106022345.792f4060,idm:DL1-8040020251103205102.5b01ab7e,
Package States: Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-59089
Severity: moderate
Released on: 12/11/2025
Advisory: RHSA-2025:21820, RHSA-2025:21138, RHSA-2025:21821, RHSA-2025:21139, RHSA-2025:21819, RHSA-2025:21140, RHSA-2025:21141, RHSA-2025:21806, RHSA-2025:21142, RHSA-2025:21818, RHSA-2025:21448, RHSA-2025:21748,
Bugzilla: 2393958
Bugzilla Description:
python-kdcproxy: Remote DoS via unbounded TCP upstream buffering
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-770
Affected Packages: idm:client-8100020251103113748.143e9e98,python-kdcproxy-0:1.0.0-7.el9_0.1,python-kdcproxy-0:1.0.0-7.el9_2.1,python-kdcproxy-0:1.0.0-7.el9_4.1,idm:DL1-8080020251029082621.b0a6ceea,idm:DL1-8060020251030180424.ada582f1,idm:DL1-8100020251028161822.823393f5,python-kdcproxy-0:1.0.0-9.el9_6,python-kdcproxy-0:1.0.0-9.el9_7,python-kdcproxy-0:1.0.0-19.el10_0,python-kdcproxy-0:1.0.0-19.el10_1,idm:DL1-8020020251106022345.792f4060,idm:DL1-8040020251103205102.5b01ab7e,
Package States: Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-40111
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414322
Bugzilla Description:
kernel: drm/vmwgfx: Fix Use-after-free in validation
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40110
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414323
Bugzilla Description:
kernel: drm/vmwgfx: Fix a null-ptr access in the cursor snooper
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40175
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414462
Bugzilla Description:
kernel: idpf: cleanup remaining SKBs in PTP flows
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40147
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414463
Bugzilla Description:
kernel: blk-throttle: fix access race during throttle policy activation
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40139
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414464
Bugzilla Description:
kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40133
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414465
Bugzilla Description:
kernel: mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40149
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414466
Bugzilla Description:
kernel: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock()
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40162
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414467
Bugzilla Description:
kernel: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40134
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414468
Bugzilla Description:
kernel: dm: fix NULL pointer dereference in __dm_suspend()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362->CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40120
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414469
Bugzilla Description:
kernel: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40161
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414470
Bugzilla Description:
kernel: mailbox: zynqmp-ipi: Fix SGI cleanup on unbind
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40127
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414472
Bugzilla Description:
kernel: hwrng: ks-sa - fix division by zero in ks_sa_rng_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40115
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414473
Bugzilla Description:
kernel: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40169
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414474
Bugzilla Description:
kernel: bpf: Reject negative offsets for ALU ops
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-839
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40131
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414475
Bugzilla Description:
kernel: wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40167
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414476
Bugzilla Description:
kernel: ext4: detect invalid INLINE_DATA + EXTENTS flag combination
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40157
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414477
Bugzilla Description:
kernel: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40156
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414478
Bugzilla Description:
kernel: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40163
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414479
Bugzilla Description:
kernel: sched/deadline: Stop dl_server before CPU goes offline
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40150
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414480
Bugzilla Description:
kernel: f2fs: fix to avoid migrating empty section
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40121
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414481
Bugzilla Description:
kernel: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40168
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414482
Bugzilla Description:
kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40148
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414483
Bugzilla Description:
kernel: drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40144
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414484
Bugzilla Description:
kernel: nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40166
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414485
Bugzilla Description:
kernel: drm/xe/guc: Check GuC running state before deregistering exec queue
CVSS Score:
CVSSv3 Score: 4.5
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40136
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414486
Bugzilla Description:
kernel: crypto: hisilicon/qm - request reserved interrupt for virtual function
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40128
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414487
Bugzilla Description:
kernel: btrfs: fix symbolic link reading when bs > ps
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40145
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414488
Bugzilla Description:
kernel: PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40160
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414489
Bugzilla Description:
kernel: xen/events: Return -EEXIST for bound VIRQs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-670
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40140
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414490
Bugzilla Description:
kernel: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-366
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40177
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414491
Bugzilla Description:
kernel: accel/qaic: Fix bootlog initialization ordering
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40173
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414492
Bugzilla Description:
kernel: net/ip6_tunnel: Prevent perpetual tunnel growth
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-122
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40155
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414493
Bugzilla Description:
kernel: iommu/vt-d: debugfs: Fix legacy mode page table dump logic
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-704
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40154
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414494
Bugzilla Description:
kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40153
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414495
Bugzilla Description:
kernel: mm: hugetlb: avoid soft lockup when mprotect to large memory area
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40159
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414496
Bugzilla Description:
kernel: xsk: Harden userspace-supplied xdp_desc validation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40165
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414497
Bugzilla Description:
kernel: media: nxp: imx8-isi: m2m: Fix streaming cleanup on release
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40174
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414498
Bugzilla Description:
kernel: x86/mm: Fix SMP ordering in switch_mm_irqs_off()
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40124
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414499
Bugzilla Description:
kernel: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40146
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414500
Bugzilla Description:
kernel: blk-mq: fix potential deadlock while nr_requests grown
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40164
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414501
Bugzilla Description:
kernel: usbnet: Fix using smp_processor_id() in preemptible code warnings
CVSS Score:
CVSSv3 Score: 2.3
Vector:
CWE: CWE-662
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40117
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414502
Bugzilla Description:
kernel: misc: pci_endpoint_test: Fix array underflow in pci_endpoint_test_ioctl()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40113
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414503
Bugzilla Description:
kernel: remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E
CVSS Score:
CVSSv3 Score: 2.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40125
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414504
Bugzilla Description:
kernel: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-253
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40171
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414505
Bugzilla Description:
kernel: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40170
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414506
Bugzilla Description:
kernel: net: use dst_dev_rcu() in sk_setup_caps()
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40138
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414507
Bugzilla Description:
kernel: f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40122
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414508
Bugzilla Description:
kernel: perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40118
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414509
Bugzilla Description:
kernel: scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40126
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414510
Bugzilla Description:
kernel: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40123
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414511
Bugzilla Description:
kernel: bpf: Enforce expected_attach_type for tailcall compatibility
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-843
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40116
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414512
Bugzilla Description:
kernel: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40172
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414513
Bugzilla Description:
kernel: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40151
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414514
Bugzilla Description:
kernel: LoongArch: BPF: No support of struct argument in trampoline programs
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40130
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414515
Bugzilla Description:
kernel: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40132
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414516
Bugzilla Description:
kernel: ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40129
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414517
Bugzilla Description:
kernel: sunrpc: fix null pointer dereference on zero-length checksum
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40119
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414518
Bugzilla Description:
kernel: ext4: fix potential null deref in ext4_mb_init()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40142
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414519
Bugzilla Description:
kernel: ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40137
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414520
Bugzilla Description:
kernel: f2fs: fix to truncate first page in error path of f2fs_truncate()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40135
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414521
Bugzilla Description:
kernel: ipv6: use RCU in ip6_xmit()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40141
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414522
Bugzilla Description:
kernel: Bluetooth: ISO: Fix possible UAF on iso_conn_free
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40158
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414523
Bugzilla Description:
kernel: ipv6: use RCU in ip6_output()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40176
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414524
Bugzilla Description:
kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40143
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414525
Bugzilla Description:
kernel: bpf: dont report verifier bug for missing bpf_scc_visit on speculative path
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40152
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414526
Bugzilla Description:
kernel: drm/msm: Fix bootup splat with separate_gpu_drm modparam
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-63396
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414697
Bugzilla Description:
pytorch: PyTorch denial of service
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat Enterprise Linux AI (RHEL AI) 3,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Trusted Artifact Signer,
Full Details
CVE document
CVE-2025-40178
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414704
Bugzilla Description:
kernel: pid: Add a judgment for ns null in pid_nr_ns
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40181
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414706
Bugzilla Description:
kernel: x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40179
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414708
Bugzilla Description:
kernel: ext4: verify orphan file size is not too big
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40183
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414709
Bugzilla Description:
kernel: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-771
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40192
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414710
Bugzilla Description:
kernel: Revert "ipmi: fix msg stack when IPMI is disconnected"
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40189
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414711
Bugzilla Description:
kernel: net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in lan78xx_read_raw_eeprom
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40206
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414712
Bugzilla Description:
kernel: netfilter: nft_objref: validate objref and objrefmap expressions
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-674
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40180
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414713
Bugzilla Description:
kernel: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40197
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414714
Bugzilla Description:
kernel: media: mc: Clear minor number before put device
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40205
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414715
Bugzilla Description:
kernel: btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40204
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414718
Bugzilla Description:
kernel: sctp: Fix MAC comparison to be constant-time
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-208
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40207
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414719
Bugzilla Description:
kernel: media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40208
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414720
Bugzilla Description:
kernel: media: iris: fix module removal if firmware download failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40191
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414721
Bugzilla Description:
kernel: drm/amdkfd: Fix kfd process ref leaking when userptr unmapping
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40195
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414722
Bugzilla Description:
kernel: Linux kernel: NULL pointer dereference in mount leads to local denial of service
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40186
Severity: important
Released on: 12/11/2025
Advisory: RHSA-2025:22392,
Bugzilla: 2414724
Bugzilla Description:
kernel: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-826
Affected Packages: kernel-0:5.14.0-570.69.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40201
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414726
Bugzilla Description:
kernel: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40184
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414727
Bugzilla Description:
kernel: KVM: arm64: Fix debug checking for np-guests using huge mappings
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40202
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414730
Bugzilla Description:
kernel: ipmi: Rework user message limit handling
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40203
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414731
Bugzilla Description:
kernel: listmount: don't call path_put() under namespace semaphore
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40190
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414732
Bugzilla Description:
kernel: ext4: guard against EA inode refcount underflow in xattr update
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40199
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414733
Bugzilla Description:
kernel: page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40200
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414736
Bugzilla Description:
kernel: Squashfs: reject negative file sizes in squashfs_read_inode()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-839
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40182
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414738
Bugzilla Description:
kernel: crypto: skcipher - Fix reqsize handling
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40194
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414739
Bugzilla Description:
kernel: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40185
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414741
Bugzilla Description:
kernel: ice: ice_adapter: release xa entry on adapter allocation failure
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40188
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414742
Bugzilla Description:
kernel: pwm: berlin: Fix wrong register in suspend/resume
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40193
Severity:
Released on: 12/11/2025
Advisory:
Bugzilla: 2414743
Bugzilla Description:
kernel: xtensa: simdisk: add input size check in proc_write_simdisk
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40198
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414744
Bugzilla Description:
kernel: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-170
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40196
Severity: low
Released on: 12/11/2025
Advisory:
Bugzilla: 2414745
Bugzilla Description:
kernel: fs: quota: create dedicated workqueue for quota_release_work
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-821
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40187
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2414746
Bugzilla Description:
kernel: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13193
Severity: moderate
Released on: 12/11/2025
Advisory:
Bugzilla: 2415409
Bugzilla Description:
libvirt: Information disclosure via world-readable VM snapshots
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13020
Severity: moderate
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414085
Bugzilla Description:
firefox: thunderbird: Use-after-free in the WebRTC: Audio/Video component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-825
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13027
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414095
Bugzilla Description:
firefox: Memory safety bugs fixed in Firefox 145 and Thunderbird 145
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13018
Severity: moderate
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414079
Bugzilla Description:
firefox: thunderbird: Mitigation bypass in the DOM: Security component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-79
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13019
Severity: moderate
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414084
Bugzilla Description:
firefox: thunderbird: Same-origin policy bypass in the DOM: Workers component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-346
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13017
Severity: moderate
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414092
Bugzilla Description:
firefox: thunderbird: Same-origin policy bypass in the DOM: Notifications component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-501
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13026
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414082
Bugzilla Description:
firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13025
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414088
Bugzilla Description:
firefox: Incorrect boundary conditions in the Graphics: WebGPU component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-805
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13024
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414081
Bugzilla Description:
firefox: JIT miscompilation in the JavaScript Engine: JIT component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-783
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13016
Severity: important
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414083
Bugzilla Description:
firefox: thunderbird: Incorrect boundary conditions in the JavaScript: WebAssembly component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13021
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414075
Bugzilla Description:
firefox: Incorrect boundary conditions in the Graphics: WebGPU component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13022
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414077
Bugzilla Description:
firefox: Incorrect boundary conditions in the Graphics: WebGPU component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13023
Severity: important
Released on: 11/11/2025
Advisory:
Bugzilla: 2414087
Bugzilla Description:
firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-13014
Severity: moderate
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414080
Bugzilla Description:
firefox: thunderbird: Use-after-free in the Audio/Video component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-825
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13015
Severity: low
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414090
Bugzilla Description:
firefox: thunderbird: Spoofing issue in Firefox
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE: CWE-290
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13012
Severity: important
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414086
Bugzilla Description:
firefox: thunderbird: Race condition in the Graphics component
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-366
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-13013
Severity: moderate
Released on: 11/11/2025
Advisory: RHSA-2025:22372, RHSA-2025:22371, RHSA-2025:22363, RHSA-2025:22374, RHSA-2025:21120, RHSA-2025:22373, RHSA-2025:21280, RHSA-2025:21281, RHSA-2025:22369, RHSA-2025:22368, RHSA-2025:21841, RHSA-2025:21842, RHSA-2025:21843, RHSA-2025:21121, RHSA-2025:21881, RHSA-2025:22375, RHSA-2025:22367, RHSA-2025:21844,
Bugzilla: 2414091
Bugzilla Description:
firefox: thunderbird: Mitigation bypass in the DOM: Core & HTML component
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-79
Affected Packages: firefox-0:140.5.0-1.el8_2,firefox-0:140.5.0-1.el9_0,firefox-0:140.5.0-1.el8_4,firefox-0:140.5.0-1.el9_2,firefox-0:140.5.0-1.el8_6,firefox-0:140.5.0-1.el9_4,firefox-0:140.5.0-1.el7_9,firefox-0:140.5.0-1.el8_8,firefox-0:140.5.0-1.el9_7,firefox-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el10_0,thunderbird-0:140.5.0-2.el8_10,thunderbird-0:140.5.0-2.el10_1,firefox-0:140.5.0-1.el8_10,firefox-0:140.5.0-2.el10_0,firefox-0:140.5.0-2.el10_1,thunderbird-0:140.5.0-1.el9_6,thunderbird-0:140.5.0-1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-64529
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413926
Bugzilla Description:
spicedb: SpiceDB: Silent WriteRelationships failure leads to incorrect permissions
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-770
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64518
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413922
Bugzilla Description:
cyclonedx-core-java: CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-611
Affected Packages:
Package States: AMQ Clients,Cryostat 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 3,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-64507
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413919
Bugzilla Description:
Incus: Incus vulnerable to local privilege escalation through custom storage volumes
CVSS Score:
CVSSv3 Score: 8.4
Vector:
CWE: CWE-269
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64484
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413911
Bugzilla Description:
oauth2-proxy: OAuth2-Proxy vulnerable to header smuggling via underscore, leading to potential privilege escalation
CVSS Score:
CVSSv3 Score: 8.5
Vector:
CWE: CWE-644
Affected Packages:
Package States: Red Hat Ceph Storage 8,
Full Details
CVE document
CVE-2025-12727
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413858
Bugzilla Description:
chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12445
Severity: low
Released on: 10/11/2025
Advisory:
Bugzilla: 2413847
Bugzilla Description:
chromium-browser: Policy bypass in Extensions
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-266
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12446
Severity: low
Released on: 10/11/2025
Advisory:
Bugzilla: 2413855
Bugzilla Description:
chromium-browser: Incorrect security UI in SplitView
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-1021
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12443
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413850
Bugzilla Description:
chromium-browser: Out of bounds read in WebXR
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12444
Severity: low
Released on: 10/11/2025
Advisory:
Bugzilla: 2413863
Bugzilla Description:
chromium-browser: Incorrect security UI in Fullscreen UI
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-357
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12441
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413854
Bugzilla Description:
chromium-browser: Out of bounds read in V8
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12439
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413865
Bugzilla Description:
chromium-browser: Inappropriate implementation in App-Bound Encryption
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-524
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12440
Severity: low
Released on: 10/11/2025
Advisory:
Bugzilla: 2413866
Bugzilla Description:
chromium-browser: Inappropriate implementation in Autofill
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-524
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12438
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413868
Bugzilla Description:
chromium-browser: Use after free in Ozone
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12437
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413872
Bugzilla Description:
chromium-browser: Use after free in PageInfo
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12436
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413851
Bugzilla Description:
chromium-browser: Policy bypass in Extensions
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-266
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12432
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413859
Bugzilla Description:
chromium-browser: Race in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-366
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12433
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413867
Bugzilla Description:
chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-823
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12430
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413853
Bugzilla Description:
chromium-browser: Object lifecycle issue in Media
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12431
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413869
Bugzilla Description:
chromium-browser: Inappropriate implementation in Extensions
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-749
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12429
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413856
Bugzilla Description:
chromium-browser: Inappropriate implementation in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12428
Severity: important
Released on: 10/11/2025
Advisory:
Bugzilla: 2413874
Bugzilla Description:
chromium-browser: Type Confusion in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-843
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-62689
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413716
Bugzilla Description:
libmicrohttpd: GNU libmicrohttpd null pointer dereference
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-59777
Severity: moderate
Released on: 10/11/2025
Advisory:
Bugzilla: 2413717
Bugzilla Description:
libmicrohttpd: GNU libmicrohttpd null pointer dereference
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-60876
Severity: low
Released on: 10/11/2025
Advisory:
Bugzilla: 2413825
Bugzilla Description:
busybox: BusyBox wget: HTTP request-target allows header injection
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-93
Affected Packages:
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-40109
Severity: moderate
Released on: 09/11/2025
Advisory:
Bugzilla: 2413619
Bugzilla Description:
kernel: crypto: rng - Ensure set_ent is always present
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40108
Severity:
Released on: 09/11/2025
Advisory:
Bugzilla: 2413620
Bugzilla Description:
kernel: serial: qcom-geni: Fix blocked task
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-64433
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413496
Bugzilla Description:
kubevirt.io/kubevirt: KubeVirt Arbitrary Container File Read
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Web Terminal,
Full Details
CVE document
CVE-2025-64437
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413489
Bugzilla Description:
kubevirt.io/kubevirt: KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-59
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Web Terminal,
Full Details
CVE document
CVE-2025-64436
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413490
Bugzilla Description:
kubevirt.io/kubevirt: KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: (CWE-269|CWE-276)
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Web Terminal,
Full Details
CVE document
CVE-2025-64435
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413498
Bugzilla Description:
kubevirt.io/kubevirt: KubeVirt VMI Denial-of-Service Using Pod Impersonation
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-703
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Web Terminal,
Full Details
CVE document
CVE-2025-64434
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413483
Bugzilla Description:
kubevirt: KubeVirt: API Identity Spoofing Vulnerability
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-295
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,
Full Details
CVE document
CVE-2025-64432
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413422
Bugzilla Description:
kubevirt.io/kubevirt: KubeVirt Authentication Bypass in Kubernetes Aggregation Layer
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: (CWE-287|CWE-295)
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Web Terminal,
Full Details
CVE document
CVE-2025-10966
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413308
Bugzilla Description:
curl: Curl missing SFTP host verification with wolfSSH backend
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-322
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat Trusted Profile Analyzer,
Full Details
CVE document
CVE-2025-12863
Severity: important
Released on: 07/11/2025
Advisory:
Bugzilla: 2413323
Bugzilla Description:
libxml2: Namespace Use-After-Free in xmlSetTreeDoc() function of libxml2
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-12748
Severity: moderate
Released on: 07/11/2025
Advisory:
Bugzilla: 2413801
Bugzilla Description:
libvirt: Denial of service in XML parsing
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11460
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413252
Bugzilla Description:
chromium-browser: Use after free in Storage
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11458
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413261
Bugzilla Description:
chromium-browser: Heap buffer overflow in Sync
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11756
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413269
Bugzilla Description:
chromium-browser: Use after free in Safe Browsing
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12036
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413259
Bugzilla Description:
chromium-browser: Out of bounds memory access in V8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-823
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11219
Severity: low
Released on: 06/11/2025
Advisory:
Bugzilla: 2413258
Bugzilla Description:
chromium-browser: Use after free in V8
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-825
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11215
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2413268
Bugzilla Description:
chromium-browser: Off by one error in V8
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-193
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11211
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2413257
Bugzilla Description:
chromium-browser: Out of bounds read in Media
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11208
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2413254
Bugzilla Description:
chromium-browser: Inappropriate implementation in Media
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-79
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11210
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2413256
Bugzilla Description:
chromium-browser: Side-channel information leakage in Tab
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-208
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11207
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2413260
Bugzilla Description:
chromium-browser: Side-channel information leakage in Storage
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-515
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11206
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413262
Bugzilla Description:
chromium-browser: Heap buffer overflow in Video
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11205
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413265
Bugzilla Description:
chromium-browser: Heap buffer overflow in WebGPU
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-64171
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2412992
Bugzilla Description:
marin3r: MARIN3R: Cross-Namespace Vulnerability in the Operator
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-862
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12789
Severity: moderate
Released on: 06/11/2025
Advisory:
Bugzilla: 2413001
Bugzilla Description:
rhsso: Open Redirect
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-601
Affected Packages:
Package States: Red Hat Single Sign-On 7,
Full Details
CVE document
CVE-2025-12790
Severity: important
Released on: 06/11/2025
Advisory:
Bugzilla: 2413004
Bugzilla Description:
rubygem-mqtt: rubygem-mqtt hostname validation
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-29
Affected Packages:
Package States: Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-64459
Severity: important
Released on: 05/11/2025
Advisory:
Bugzilla: 2412651
Bugzilla Description:
django: Django SQL injection
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-89
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-64458
Severity: important
Released on: 05/11/2025
Advisory:
Bugzilla: 2412649
Bugzilla Description:
Django: Denial-of-service vulnerability in Django on Windows
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-407
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-47151
Severity: critical
Released on: 05/11/2025
Advisory: RHSA-2025:21400, RHSA-2025:21401, RHSA-2025:21402, RHSA-2025:21403, RHSA-2025:21462, RHSA-2025:21452, RHSA-2025:21399, RHSA-2025:21628, RHSA-2025:21404, RHSA-2025:21405, RHSA-2025:21406,
Bugzilla: 2412739
Bugzilla Description:
lasso: Type confusion in Entr'ouvert Lasso
CVSS Score:
CVSSv3 Score: 9.8
Vector:
CWE: CWE-843
Affected Packages: lasso-0:2.7.0-9.el9_0.1,lasso-0:2.7.0-11.el9_7.3,lasso-0:2.6.0-13.el8_8.1,lasso-0:2.7.0-11.el9_6.2,lasso-0:2.7.0-11.el9_4.1,lasso-0:2.5.1-8.el7_9.1,lasso-0:2.7.0-11.el9_2.1,lasso-0:2.6.0-8.el8_2.1,lasso-0:2.6.0-12.el8_6.1,lasso-0:2.6.0-14.el8_10,lasso-0:2.6.0-8.el8_4.1,
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-46404
Severity: moderate
Released on: 05/11/2025
Advisory:
Bugzilla: 2412741
Bugzilla Description:
lasso: Denial of service in Entr'ouvert Lasso
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-46784
Severity: moderate
Released on: 05/11/2025
Advisory:
Bugzilla: 2412742
Bugzilla Description:
lasso: Memory exhaustion in Entr'ouvert Lasso
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-46705
Severity: moderate
Released on: 05/11/2025
Advisory:
Bugzilla: 2412740
Bugzilla Description:
lasso: Denial of service in Entr'ouvert Lasso
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-617
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-52881
Severity: important
Released on: 05/11/2025
Advisory: RHSA-2025:22030, RHSA-2025:22011, RHSA-2025:19927, RHSA-2025:21633, RHSA-2025:21634, RHSA-2025:21220, RHSA-2025:22012, RHSA-2025:21232, RHSA-2025:21795, RHSA-2025:20957, RHSA-2025:21702, RHSA-2025:21328, RHSA-2025:21824,
Bugzilla: 2404715
Bugzilla Description:
runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-59
Affected Packages: buildah-2:1.41.6-1.el9_7,runc-4:1.2.5-3.el9_6,runc,rhcos-418.94.202511170715-0,podman-5:5.4.0-15.el9_6,kernel,containernetworking-plugins,podman-7:5.6.0-6.el10_1,runc-4:1.3.0-4.el9_7,cri-tools,podman-6:5.6.0-7.el9_7,rhcos-416.94.202511191934-0,buildah-2:1.41.6-1.el10_1,cri-o,skopeo,buildah-2:1.39.5-1.el10_0,buildah-2:1.39.5-1.el9_6,container-tools:rhel8-8100020251112161627.afee755d,kernel-rt,
Package States: Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-12735
Severity: critical
Released on: 05/11/2025
Advisory:
Bugzilla: 2412409
Bugzilla Description:
expr-eval:
CVSS Score:
CVSSv3 Score: 9.8
Vector:
CWE: CWE-917
Affected Packages:
Package States: Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-31133
Severity: important
Released on: 05/11/2025
Advisory: RHSA-2025:21232, RHSA-2025:21795, RHSA-2025:20957, RHSA-2025:21328, RHSA-2025:21824, RHSA-2025:19927,
Bugzilla: 2404705
Bugzilla Description:
runc: container escape via 'masked path' abuse due to mount race conditions
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-59
Affected Packages: rhcos-416.94.202511191934-0,runc-4:1.2.5-3.el9_6,runc,cri-o,rhcos-418.94.202511170715-0,kernel,skopeo,containernetworking-plugins,runc-4:1.3.0-4.el9_7,cri-tools,container-tools:rhel8-8100020251112161627.afee755d,kernel-rt,
Package States: Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-52565
Severity: important
Released on: 05/11/2025
Advisory: RHSA-2025:21232, RHSA-2025:21795, RHSA-2025:20957, RHSA-2025:21328, RHSA-2025:21824, RHSA-2025:19927,
Bugzilla: 2404708
Bugzilla Description:
runc: container escape with malicious config due to /dev/console mount and related races
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-59
Affected Packages: rhcos-416.94.202511191934-0,runc-4:1.2.5-3.el9_6,runc,cri-o,rhcos-418.94.202511170715-0,kernel,skopeo,containernetworking-plugins,runc-4:1.3.0-4.el9_7,cri-tools,container-tools:rhel8-8100020251112161627.afee755d,kernel-rt,
Package States: Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-60753
Severity: moderate
Released on: 05/11/2025
Advisory:
Bugzilla: 2412648
Bugzilla Description:
libarchive: bsdtar hangs and OOMs with zero-length pattern matches
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: (CWE-400|CWE-835)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-62507
Severity: important
Released on: 04/11/2025
Advisory:
Bugzilla: 2412366
Bugzilla Description:
redis: Redis: Bug in XACKDEL may lead to stack overflow and potential RCE
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: (CWE-121|CWE-20)
Affected Packages:
Package States: Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11953
Severity: important
Released on: 03/11/2025
Advisory:
Bugzilla: 2412025
Bugzilla Description:
@react-native-community/cli-server-api: Command injection in React Native CLI
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-78
Affected Packages:
Package States:
Full Details
CVE document
CVE-2024-12125
Severity: important
Released on: 03/11/2025
Advisory:
Bugzilla: 2330214
Bugzilla Description:
3scale-porta: Readonly fields not validated server-side
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-281
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,
Full Details
CVE document
CVE-2025-40107
Severity:
Released on: 03/11/2025
Advisory:
Bugzilla: 2411971
Bugzilla Description:
kernel: can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-10622
Severity: important
Released on: 01/11/2025
Advisory: RHSA-2025:19832, RHSA-2025:19855, RHSA-2025:19721, RHSA-2025:19856,
Bugzilla: 2396020
Bugzilla Description:
foreman: OS command injection via ct_location and fcct_location parameters
CVSS Score:
CVSSv3 Score: 8.0
Vector:
CWE: (CWE-78|CWE-602)
Affected Packages: foreman-0:3.12.0.11-1.el9sat,foreman-0:3.12.0.11-1.el8sat,foreman-0:3.14.0.10-1.el9sat,foreman-0:3.16.0.4-1.el9sat,foreman-0:3.9.1.13-1.el8sat,
Package States: Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-6075
Severity: low
Released on: 31/10/2025
Advisory:
Bugzilla: 2408891
Bugzilla Description:
python: Quadratic complexity in os.path.expandvars() with user-controlled template
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-11602
Severity: moderate
Released on: 31/10/2025
Advisory:
Bugzilla: 2408814
Bugzilla Description:
neo4j: Untargeted information leak in Bolt protocol handshake
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-226
Affected Packages:
Package States: Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-23050
Severity: low
Released on: 31/10/2025
Advisory:
Bugzilla: 2408769
Bugzilla Description:
qt: qt5: qt6: Qt missing length checks
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40106
Severity:
Released on: 31/10/2025
Advisory:
Bugzilla: 2408808
Bugzilla Description:
kernel: comedi: fix divide-by-zero in comedi_buf_munge()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-12060
Severity: important
Released on: 30/10/2025
Advisory:
Bugzilla: 2407443
Bugzilla Description:
keras: Keras Path Traversal Vulnerability
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Trusted Artifact Signer,
Full Details
CVE document
CVE-2025-40094
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407329
Bugzilla Description:
usb: gadget: f_acm: Refactor bind path to use __free()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-40102
Severity: moderate
Released on: 30/10/2025
Advisory:
Bugzilla: 2407325
Bugzilla Description:
kernel: KVM: arm64: Prevent access to vCPU events before init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40100
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407327
Bugzilla Description:
kernel: btrfs: do not assert we found block group item when creating free space tree
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40105
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407328
Bugzilla Description:
kernel: vfs: Don't leak disconnected dentries on umount
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40089
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407330
Bugzilla Description:
kernel: cxl/features: Add check for no entries in cxl_feature_info
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40091
Severity: moderate
Released on: 30/10/2025
Advisory:
Bugzilla: 2407331
Bugzilla Description:
kernel: ixgbe: fix too early devlink_free() in ixgbe_remove()
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40097
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407332
Bugzilla Description:
kernel: ALSA: hda: Fix missing pointer check in hda_component_manager_init function
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40096
Severity: moderate
Released on: 30/10/2025
Advisory:
Bugzilla: 2407333
Bugzilla Description:
kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40088
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407334
Bugzilla Description:
kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40086
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407335
Bugzilla Description:
kernel: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40090
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407336
Bugzilla Description:
kernel: ksmbd: fix recursive locking in RPC handle list access
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40095
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407339
Bugzilla Description:
kernel: usb: gadget: f_rndis: Refactor bind path to use __free()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40093
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407340
Bugzilla Description:
kernel: usb: gadget: f_ecm: Refactor bind path to use __free()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40099
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407341
Bugzilla Description:
kernel: cifs: parse_dfs_referrals: prevent oob on malformed input
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40101
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407343
Bugzilla Description:
kernel: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40092
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407344
Bugzilla Description:
kernel: usb: gadget: f_ncm: Refactor bind path to use __free()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40087
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407346
Bugzilla Description:
kernel: NFSD: Define a proc_layoutcommit for the FlexFiles layout type
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40098
Severity:
Released on: 30/10/2025
Advisory:
Bugzilla: 2407347
Bugzilla Description:
kernel: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40104
Severity: moderate
Released on: 30/10/2025
Advisory:
Bugzilla: 2407348
Bugzilla Description:
kernel: ixgbevf: fix mailbox API compatibility by negotiating supported features
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-440
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40103
Severity: low
Released on: 30/10/2025
Advisory:
Bugzilla: 2407350
Bugzilla Description:
kernel: smb: client: Fix refcount leak for cifs_sb_tlink
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-58188
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407255
Bugzilla Description:
crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-617
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Fence Agents Remediation Operator,Fence Agents Remediation Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,mirror registry for Red Hat OpenShift,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Application Pipeline,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Self Node Remediation Operator,Self Node Remediation Operator,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-61724
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407257
Bugzilla Description:
net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1046
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Cryostat 4,Cryostat 4,Cryostat 4,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Fence Agents Remediation Operator,Fence Agents Remediation Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Self Node Remediation Operator,Self Node Remediation Operator,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-58183
Severity: moderate
Released on: 29/10/2025
Advisory: RHSA-2025:21964, RHSA-2025:22012, RHSA-2025:22345, RHSA-2025:21815, RHSA-2025:21816, RHSA-2025:22030, RHSA-2025:22011, RHSA-2025:22181, RHSA-2025:21778, RHSA-2025:21779, RHSA-2025:21856,
Bugzilla: 2407258
Bugzilla Description:
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: buildah-2:1.41.6-1.el9_7,delve-0:1.25.2-1.el9_6,podman-5:5.4.0-15.el9_6,golang-0:1.25.3-1.el9_6,golang-0:1.25.3-1.el9_7,golang-0:1.25.3-1.el10_1,golang-0:1.21.13-12.el9_4,golang-0:1.25.3-1.el10_0,delve-0:1.25.2-1.el10_0,delve-0:1.25.2-1.el10_1,source-to-image/source-to-image-rhel8:sha256:7406fa611ebf57f643ce6a806c7cdcc076da0232132f9cfc17fad285613da631,buildah-2:1.41.6-1.el10_1,golang-0:1.19.13-20.el9_2,source-to-image/source-to-image-rhel9:sha256:da32c67fe7841fe39dbc3f41a1deaa8b045f71ae251743b404d7f33871acb05f,buildah-2:1.39.6-1.el9_6,delve-0:1.25.2-1.el9_7,
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Gatekeeper 3,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Service Interconnect 2,Red Hat Trusted Application Pipeline,Red Hat Trusted Artifact Signer,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-47912
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407247
Bugzilla Description:
net/url: Insufficient validation of bracketed IPv6 hostnames in net/url
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1286
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Fence Agents Remediation Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Virtualization,mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift 2,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Self Node Remediation Operator,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-58185
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407251
Bugzilla Description:
encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Fence Agents Remediation Operator,Fence Agents Remediation Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,mirror registry for Red Hat OpenShift,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Service Interconnect 2,Red Hat Trusted Application Pipeline,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Self Node Remediation Operator,Self Node Remediation Operator,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-61723
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407252
Bugzilla Description:
encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Fence Agents Remediation Operator,Fence Agents Remediation Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,mirror registry for Red Hat OpenShift,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Application Pipeline,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Self Node Remediation Operator,Self Node Remediation Operator,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-61725
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407249
Bugzilla Description:
net/mail: Excessive CPU consumption in ParseAddress in net/mail
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Migration Toolkit for Applications 7,Migration Toolkit for Containers,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Service Interconnect 2,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-58189
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407260
Bugzilla Description:
crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-117
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Assisted Installer for Red Hat OpenShift Container Platform 2,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Confidential Compute Attestation,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,Deployment Validation Operator,external secrets operator for Red Hat OpenShift - Tech Preview,Fence Agents Remediation Operator,Fence Agents Remediation Operator,File Integrity Operator,File Integrity Operator,File Integrity Operator,Gatekeeper 3,Gatekeeper 3,Kube Descheduler Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Logical Volume Manager Storage,Machine Deletion Remediation Operator,Machine Deletion Remediation Operator,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Applications 8,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,mirror registry for Red Hat OpenShift,mirror registry for Red Hat OpenShift,Multiarch Tuning Operator,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Lightspeed,OpenShift Pipelines,OpenShift Run Once Duration Override Operator,OpenShift Run Once Duration Override Operator,OpenShift Secondary Scheduler Operator,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Source-to-Image (S2I),Power monitoring for Red Hat OpenShift,Power monitoring for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Certification for Red Hat Enterprise Linux 8,Red Hat Certification Program for Red Hat Enterprise Linux 9,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Developer Hub,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Edge Manager preview,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift for Windows Containers,Red Hat OpenShift for Windows Containers,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenShift Update Service,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Runtimes Inventory Operator,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Service Interconnect 2,Red Hat Trusted Application Pipeline,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Red Hat Web Terminal,Self Node Remediation Operator,Self Node Remediation Operator,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,Service Telemetry Framework 1.5,streams for Apache Kafka 3,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-10934
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407233
Bugzilla Description:
gimp: GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-122
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-10925
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407199
Bugzilla Description:
gimp: GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-121
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-10924
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407200
Bugzilla Description:
gimp: GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-190
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-10923
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407192
Bugzilla Description:
gimp: GIMP WBMP File Parsing Integer Overflow Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-190
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-10922
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407188
Bugzilla Description:
gimp: GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-122
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-10921
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407194
Bugzilla Description:
gimp: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-122
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-10920
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21968,
Bugzilla: 2407191
Bugzilla Description:
gimp: GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages: gimp-2:3.0.4-1.el9_7.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-11232
Severity: important
Released on: 29/10/2025
Advisory: RHSA-2025:21038,
Bugzilla: 2407178
Bugzilla Description:
kea: Invalid characters cause assert
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-823
Affected Packages: kea-0:3.0.1-2.el10_1,
Package States:
Full Details
CVE document
CVE-2025-12058
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407019
Bugzilla Description:
keras: Keras Model.load_model Arbitrary Local File Loading and SSRF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-502
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat Trusted Artifact Signer,
Full Details
CVE document
CVE-2025-62229
Severity: moderate
Released on: 29/10/2025
Advisory: RHSA-2025:19909, RHSA-2025:22096, RHSA-2025:22041, RHSA-2025:22077, RHSA-2025:22055, RHSA-2025:22164, RHSA-2025:22040, RHSA-2025:22051, RHSA-2025:19432, RHSA-2025:20960, RHSA-2025:19433, RHSA-2025:20961, RHSA-2025:22167, RHSA-2025:19623, RHSA-2025:22365, RHSA-2025:22056, RHSA-2025:22364, RHSA-2025:21035, RHSA-2025:19434, RHSA-2025:19489, RHSA-2025:19435, RHSA-2025:20958,
Bugzilla: 2402649
Bugzilla Description:
xorg: xmayland: Use-after-free in XPresentNotify structure creation
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-416
Affected Packages: xorg-x11-server-0:1.20.11-12.el9_0,xorg-x11-server-0:1.20.11-32.el9_6,xorg-x11-server-0:1.20.11-32.el9_7,xorg-x11-server-0:1.20.4-33.el7_9,tigervnc-0:1.15.0-8.el8_10,tigervnc-0:1.14.1-9.el9_6,tigervnc-0:1.13.1-8.el9_4.8,xorg-x11-server-0:1.20.11-27.el8_10,tigervnc-0:1.11.0-8.el8_4.14,xorg-x11-server-Xwayland-0:24.1.5-5.el10_0,xorg-x11-server-0:1.20.11-19.el9_2,xorg-x11-server-Xwayland-0:24.1.5-5.el10_1,tigervnc-0:1.9.0-15.el8_2.15,tigervnc-0:1.12.0-15.el8_8.16,tigervnc-0:1.12.0-6.el8_6.15,tigervnc-0:1.15.0-6.el9_7,tigervnc-0:1.12.0-14.el9_2.13,tigervnc-0:1.11.0-22.el9_0.16,xorg-x11-server-Xwayland-0:23.2.7-5.el9_7,tigervnc-0:1.8.0-36.el7_9.3,xorg-x11-server-Xwayland-0:21.1.3-19.el8_10,xorg-x11-server-Xwayland-0:23.2.7-5.el9_6,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-62230
Severity: moderate
Released on: 29/10/2025
Advisory: RHSA-2025:19909, RHSA-2025:22096, RHSA-2025:22041, RHSA-2025:22077, RHSA-2025:22055, RHSA-2025:22164, RHSA-2025:22040, RHSA-2025:22051, RHSA-2025:19432, RHSA-2025:20960, RHSA-2025:19433, RHSA-2025:20961, RHSA-2025:22167, RHSA-2025:19623, RHSA-2025:22365, RHSA-2025:22056, RHSA-2025:22364, RHSA-2025:21035, RHSA-2025:19434, RHSA-2025:19489, RHSA-2025:19435, RHSA-2025:20958,
Bugzilla: 2402653
Bugzilla Description:
xorg: xwayland: Use-after-free in Xkb client resource removal
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-416
Affected Packages: xorg-x11-server-0:1.20.11-12.el9_0,xorg-x11-server-0:1.20.11-32.el9_6,xorg-x11-server-0:1.20.11-32.el9_7,xorg-x11-server-0:1.20.4-33.el7_9,tigervnc-0:1.15.0-8.el8_10,tigervnc-0:1.14.1-9.el9_6,tigervnc-0:1.13.1-8.el9_4.8,xorg-x11-server-0:1.20.11-27.el8_10,tigervnc-0:1.11.0-8.el8_4.14,xorg-x11-server-Xwayland-0:24.1.5-5.el10_0,xorg-x11-server-0:1.20.11-19.el9_2,xorg-x11-server-Xwayland-0:24.1.5-5.el10_1,tigervnc-0:1.9.0-15.el8_2.15,tigervnc-0:1.12.0-15.el8_8.16,tigervnc-0:1.12.0-6.el8_6.15,tigervnc-0:1.15.0-6.el9_7,tigervnc-0:1.12.0-14.el9_2.13,tigervnc-0:1.11.0-22.el9_0.16,xorg-x11-server-Xwayland-0:23.2.7-5.el9_7,tigervnc-0:1.8.0-36.el7_9.3,xorg-x11-server-Xwayland-0:21.1.3-19.el8_10,xorg-x11-server-Xwayland-0:23.2.7-5.el9_6,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-62231
Severity: moderate
Released on: 29/10/2025
Advisory: RHSA-2025:19909, RHSA-2025:22096, RHSA-2025:22041, RHSA-2025:22077, RHSA-2025:22055, RHSA-2025:22164, RHSA-2025:22040, RHSA-2025:22051, RHSA-2025:19432, RHSA-2025:20960, RHSA-2025:19433, RHSA-2025:20961, RHSA-2025:22167, RHSA-2025:19623, RHSA-2025:22365, RHSA-2025:22056, RHSA-2025:22364, RHSA-2025:21035, RHSA-2025:19434, RHSA-2025:19489, RHSA-2025:19435, RHSA-2025:20958,
Bugzilla: 2402660
Bugzilla Description:
xorg: xmayland: Value overflow in XkbSetCompatMap()
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-190
Affected Packages: xorg-x11-server-0:1.20.11-12.el9_0,xorg-x11-server-0:1.20.11-32.el9_6,xorg-x11-server-0:1.20.11-32.el9_7,xorg-x11-server-0:1.20.4-33.el7_9,tigervnc-0:1.15.0-8.el8_10,tigervnc-0:1.14.1-9.el9_6,tigervnc-0:1.13.1-8.el9_4.8,xorg-x11-server-0:1.20.11-27.el8_10,tigervnc-0:1.11.0-8.el8_4.14,xorg-x11-server-Xwayland-0:24.1.5-5.el10_0,xorg-x11-server-0:1.20.11-19.el9_2,xorg-x11-server-Xwayland-0:24.1.5-5.el10_1,tigervnc-0:1.9.0-15.el8_2.15,tigervnc-0:1.12.0-15.el8_8.16,tigervnc-0:1.12.0-6.el8_6.15,tigervnc-0:1.15.0-6.el9_7,tigervnc-0:1.12.0-14.el9_2.13,tigervnc-0:1.11.0-22.el9_0.16,xorg-x11-server-Xwayland-0:23.2.7-5.el9_7,tigervnc-0:1.8.0-36.el7_9.3,xorg-x11-server-Xwayland-0:21.1.3-19.el8_10,xorg-x11-server-Xwayland-0:23.2.7-5.el9_6,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-40085
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407069
Bugzilla Description:
kernel: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-7324
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407075
Bugzilla Description:
kernel: scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40084
Severity:
Released on: 29/10/2025
Advisory:
Bugzilla: 2407085
Bugzilla Description:
kernel: ksmbd: transport_ipc: validate payload size before reading handle
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40083
Severity: moderate
Released on: 29/10/2025
Advisory:
Bugzilla: 2407086
Bugzilla Description:
kernel: net/sched: sch_qfq: Fix null-deref in agg_dequeue
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-60542
Severity: important
Released on: 29/10/2025
Advisory:
Bugzilla: 2407114
Bugzilla Description:
TypeORM: SQL Injection via crafted request to repository.save or repository.update
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-89
Affected Packages:
Package States: Red Hat Developer Hub,
Full Details
CVE document
CVE-2025-11374
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406934
Bugzilla Description:
github.com/hashicorp/consul: Consul's KV endpoint is vulnerable to denial of service
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-62727
Severity: important
Released on: 28/10/2025
Advisory:
Bugzilla: 2406929
Bugzilla Description:
starlette: Starlette DoS via Range header merging
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-407
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-11375
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406931
Bugzilla Description:
github.com/hashicorp/consul: Consul's event endpoint is vulnerable to denial of service
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-12150
Severity: low
Released on: 28/10/2025
Advisory: RHSA-2025:22089, RHSA-2025:21370, RHSA-2025:21371, RHSA-2025:22088,
Bugzilla: 2406192
Bugzilla Description:
org.keycloak/keycloak-services: WebAuthn Attestation Statement Verification Bypass
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: (CWE-302|CWE-304)
Affected Packages: org.keycloak/keycloak-services,rhbk/keycloak-operator-bundle:26.4.4-1,rhbk/keycloak-rhel9-operator:26.4-3,rhbk/keycloak-operator-bundle:26.2.11-1,rhbk/keycloak-rhel9:26.4-3,rhbk/keycloak-rhel9-operator:26.2-12,rhbk/keycloak-rhel9:26.2-12,
Package States:
Full Details
CVE document
CVE-2025-40050
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406763
Bugzilla Description:
bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-12103
Severity: moderate
Released on: 28/10/2025
Advisory: RHSA-2025:21117,
Bugzilla: 2405966
Bugzilla Description:
openshift-ai: Trusty AI Grants All Authenticated users to list pods in any namespace
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: CWE-266
Affected Packages: rhoai/odh-trustyai-service-operator-rhel9:sha256:d4fae05531a06016112624e40f9a4b8bb374495d665206c5a325f80f78781746,
Package States: Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-40026
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406712
Bugzilla Description:
kernel: KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-754
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40027
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406713
Bugzilla Description:
kernel: net/9p: fix double req put in p9_fd_cancelled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40028
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406714
Bugzilla Description:
kernel: binder: fix double-free in dbitmap
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40025
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406715
Bugzilla Description:
kernel: f2fs: fix to do sanity check on node footer for non inode dnode
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40030
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406728
Bugzilla Description:
kernel: pinctrl: check the return value of pinmux_ops::get_function_name()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40072
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406729
Bugzilla Description:
kernel: fanotify: Validate the return value of mnt_ns_from_dentry() before dereferencing
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40040
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406730
Bugzilla Description:
kernel: mm/ksm: fix flag-dropping behavior in ksm_madvise
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-674
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40038
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406731
Bugzilla Description:
kernel: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-754
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40066
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406732
Bugzilla Description:
kernel: wifi: mt76: mt7996: Check phy before init msta_link in mt7996_mac_sta_add_links()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40045
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406733
Bugzilla Description:
kernel: ASoC: codecs: wcd937x: set the comp soundwire port correctly
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40060
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406734
Bugzilla Description:
kernel: coresight: trbe: Return NULL pointer for allocation failures
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40076
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406735
Bugzilla Description:
kernel: PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40063
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406736
Bugzilla Description:
kernel: crypto: comp - Use same definition of context alloc and free ops
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-1211
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40065
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406737
Bugzilla Description:
kernel: RISC-V: KVM: Write hgatp register with valid mode bits
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40053
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406738
Bugzilla Description:
kernel: net: dlink: handle copy_thresh allocation failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40074
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406739
Bugzilla Description:
kernel: ipv4: start using dst_dev_rcu()
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40068
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406740
Bugzilla Description:
kernel: fs: ntfs3: Fix integer overflow in run_unpack()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40048
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406741
Bugzilla Description:
kernel: uio_hv_generic: Let userspace take care of interrupt mask
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40071
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406742
Bugzilla Description:
kernel: tty: n_gsm: Don't block input queue by waiting MSC
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-1322
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40081
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406743
Bugzilla Description:
kernel: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40039
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406744
Bugzilla Description:
kernel: ksmbd: Fix race condition in RPC handle list access
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40055
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406745
Bugzilla Description:
kernel: ocfs2: fix double free in user_cluster_connect()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40036
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406746
Bugzilla Description:
kernel: misc: fastrpc: fix possible map leak in fastrpc_put_args
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40064
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406747
Bugzilla Description:
kernel: smc: Fix use-after-free in __pnet_find_base_ndev()
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40079
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406748
Bugzilla Description:
kernel: riscv, bpf: Sign extend struct ops return values properly
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40031
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406749
Bugzilla Description:
kernel: tee: fix register_shm_helper()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40052
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406750
Bugzilla Description:
kernel: smb: client: fix crypto buffers in non-linear memory
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-670
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40035
Severity: low
Released on: 28/10/2025
Advisory:
Bugzilla: 2406751
Bugzilla Description:
kernel: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40057
Severity: low
Released on: 28/10/2025
Advisory:
Bugzilla: 2406752
Bugzilla Description:
kernel: ptp: Add a upper bound on max_vclocks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40032
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406753
Bugzilla Description:
kernel: PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40043
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406754
Bugzilla Description:
kernel: net: nfc: nci: Add parameter validation for packet data
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40082
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406755
Bugzilla Description:
kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40041
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406756
Bugzilla Description:
kernel: LoongArch: BPF: Sign-extend struct ops return values properly
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40037
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406757
Bugzilla Description:
kernel: fbdev: simplefb: Fix use after free in simplefb_detach_genpds()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40047
Severity: moderate
Released on: 28/10/2025
Advisory: RHSA-2025:21469, RHSA-2025:21933,
Bugzilla: 2406758
Bugzilla Description:
kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait()
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-662
Affected Packages: kernel-0:5.14.0-611.8.1.el9_7,kernel-0:5.14.0-570.66.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40077
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406759
Bugzilla Description:
kernel: f2fs: fix to avoid overflow while left shift operation
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40029
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406760
Bugzilla Description:
kernel: bus: fsl-mc: Check return value of platform_get_resource()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40061
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406761
Bugzilla Description:
kernel: RDMA/rxe: Fix race in do_task() when draining
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-821
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40078
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406762
Bugzilla Description:
kernel: bpf: Explicitly check accesses to bpf_sock_addr
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40069
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406764
Bugzilla Description:
kernel: drm/msm: Fix obj leak in VM_BIND error path
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40054
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406765
Bugzilla Description:
kernel: f2fs: fix UAF issue in f2fs_merge_page_bio()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40033
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406766
Bugzilla Description:
kernel: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40067
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406767
Bugzilla Description:
kernel: fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40070
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406768
Bugzilla Description:
kernel: pps: fix warning in pps_register_cdev when register device fail
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40059
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406769
Bugzilla Description:
kernel: coresight: Fix incorrect handling for return value of devm_kzalloc
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40049
Severity: low
Released on: 28/10/2025
Advisory:
Bugzilla: 2406771
Bugzilla Description:
kernel: Squashfs: fix uninit-value in squashfs_get_parent
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40073
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406772
Bugzilla Description:
kernel: drm/msm: Do not validate SSPP when it is not ready
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40056
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406773
Bugzilla Description:
kernel: vhost: vringh: Fix copy_to_iter return value check
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40051
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406774
Bugzilla Description:
kernel: vhost: vringh: Modify the return value check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-703
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40080
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406775
Bugzilla Description:
kernel: nbd: restrict sockets to TCP and UDP
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-1287
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40058
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406776
Bugzilla Description:
kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40062
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406777
Bugzilla Description:
kernel: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40042
Severity: low
Released on: 28/10/2025
Advisory:
Bugzilla: 2406778
Bugzilla Description:
kernel: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40044
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406779
Bugzilla Description:
kernel: fs: udf: fix OOB read in lengthAllocDescs handling
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40075
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406780
Bugzilla Description:
kernel: tcp_metrics: use dst_dev_net_rcu()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-662
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40046
Severity:
Released on: 28/10/2025
Advisory:
Bugzilla: 2406781
Bugzilla Description:
kernel: io_uring/zcrx: fix overshooting recv limit
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40034
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406782
Bugzilla Description:
kernel: PCI/AER: Avoid NULL pointer dereference in aer_ratelimit()
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-12390
Severity: moderate
Released on: 28/10/2025
Advisory: RHSA-2025:22089, RHSA-2025:21370, RHSA-2025:21371, RHSA-2025:22088,
Bugzilla: 2406793
Bugzilla Description:
org.keycloak.protocol.oidc.endpoints.LogoutEndpoint: Offline Session takeover due to reused Authentication Session ID
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-384
Affected Packages: keycloak,rhbk/keycloak-operator-bundle:26.4.4-1,rhbk/keycloak-rhel9-operator:26.4-3,rhbk/keycloak-operator-bundle:26.2.11-1,rhbk/keycloak-rhel9:26.4-3,rhbk/keycloak-rhel9-operator:26.2-12,rhbk/keycloak-rhel9:26.2-12,
Package States:
Full Details
CVE document
CVE-2025-61107
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406810
Bugzilla Description:
frr: NULL pointer dereference in show_vty_ext_pref_pref_sid() in ospf_ext.c
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61103
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406814
Bugzilla Description:
frr: NULL pointer dereference in show_vty_ext_link_lan_adj_sid() in ospf_ext.c
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61104
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406820
Bugzilla Description:
frr: NULL pointer dereference in show_vty_unknown_tlv() in ospf_ext.c
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61106
Severity: moderate
Released on: 28/10/2025
Advisory:
Bugzilla: 2406821
Bugzilla Description:
frr: NULL pointer dereference in show_vty_ext_pref_pref_sid() in ospf_ext.c
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-62725
Severity: important
Released on: 27/10/2025
Advisory:
Bugzilla: 2406643
Bugzilla Description:
docker-compose: Docker Compose Vulnerable to Path Traversal via OCI Artifact Layer Annotations
CVSS Score:
CVSSv3 Score: 8.0
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Developer Hub,
Full Details
CVE document
CVE-2025-62594
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406644
Bugzilla Description:
ImageMagick: ImageMagick CLAHE : Unsigned underflow and division-by-zero lead to OOB pointer arithmetic and process crash (DoS)
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: (CWE-119|CWE-191|CWE-369)
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-61795
Severity: moderate
Released on: 27/10/2025
Advisory: RHSA-2025:19809, RHSA-2025:19810,
Bugzilla: 2406588
Bugzilla Description:
tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Denial of service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-404
Affected Packages: tomcat-catalina,jws6-tomcat-0:10.1.36-19.redhat_00018.1.el9jws,jws6-tomcat-0:10.1.36-19.redhat_00018.1.el8jws,jws6-tomcat-0:10.1.36-19.redhat_00018.1.el10jws,
Package States: Red Hat Certificate System 10,Red Hat Certificate System 10,Red Hat Data Grid 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Core Services,Red Hat JBoss Core Services,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,Red Hat JBoss Web Server 6,Red Hat JBoss Web Server 6,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document
CVE-2025-55752
Severity: important
Released on: 27/10/2025
Advisory: RHSA-2025:19809, RHSA-2025:19810,
Bugzilla: 2406591
Bugzilla Description:
tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-23
Affected Packages: tomcat-catalina,jws6-tomcat-0:10.1.36-19.redhat_00018.1.el9jws,jws6-tomcat-0:10.1.36-19.redhat_00018.1.el8jws,jws6-tomcat-0:10.1.36-19.redhat_00018.1.el10jws,
Package States: Red Hat Certificate System 10,Red Hat Certificate System 10,Red Hat Data Grid 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Core Services,Red Hat JBoss Core Services,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,Red Hat JBoss Web Server 6,Red Hat JBoss Web Server 6,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document
CVE-2025-55754
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406590
Bugzilla Description:
org.apache.tomcat/tomcat-juli: tomcat: Apache Tomcat: console manipulation
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-150
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of OptaPlanner 8,Red Hat Certificate System 10,Red Hat Data Grid 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document
CVE-2025-12200
Severity:
Released on: 27/10/2025
Advisory:
Bugzilla: 2406465
Bugzilla Description:
dnsmasq: dnsmasq Config File option.c parse_dhcp_opt null pointer dereference
CVSS Score:
Vector:
CWE: (CWE-404|CWE-476)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-12199
Severity:
Released on: 27/10/2025
Advisory:
Bugzilla: 2406461
Bugzilla Description:
dnsmasq: dnsmasq Config File network.c check_servers null pointer dereference
CVSS Score:
Vector:
CWE: (CWE-404|CWE-476)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-12198
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406466
Bugzilla Description:
dnsmasq: dnsmasq Config File util.c parse_hex heap-based overflow
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-10939
Severity: low
Released on: 27/10/2025
Advisory: RHSA-2025:21370, RHSA-2025:21371,
Bugzilla: 2398025
Bugzilla Description:
org.keycloak/keycloak-quarkus-server: Unable to restrict access to the admin console
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-427
Affected Packages: rhbk/keycloak-operator-bundle:26.4.4-1,rhbk/keycloak-rhel9-operator:26.4-3,rhbk/keycloak-rhel9:26.4-3,org.keycloak/keycloak-quarkus-server,
Package States:
Full Details
CVE document
CVE-2025-12343
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406533
Bugzilla Description:
FFmpeg: Double-Free Vulnerability in FFmpeg TensorFlow DNN Backend
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-415
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-61099
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406601
Bugzilla Description:
FRRouting: frr: NULL Pointer Dereference in FRRouting
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61105
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406611
Bugzilla Description:
FRRouting: frr: NULL Pointer Dereference in FRRouting
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61100
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406616
Bugzilla Description:
frr: FRRouting: NULL Pointer Dereference in FRRouting
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61101
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406617
Bugzilla Description:
FRRouting: frr: NULL Pointer Dereference in FRRouting
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61102
Severity: moderate
Released on: 27/10/2025
Advisory:
Bugzilla: 2406618
Bugzilla Description:
FRRouting: frr: NULL Pointer Dereference in FRRouting
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-8709
Severity: important
Released on: 26/10/2025
Advisory:
Bugzilla: 2406382
Bugzilla Description:
langchain: SQL Injection in langchain-ai/langchain
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-89
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-12194
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406287
Bugzilla Description:
bcprov-lts8on: bc-fips: Uncontrolled Resource Consumption vulnerability in Bouncy Castle
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 3,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document
CVE-2025-62711
Severity: low
Released on: 24/10/2025
Advisory:
Bugzilla: 2406269
Bugzilla Description:
wasmtime: Wasmtime vulnerable to segfault when using component resources
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-755
Affected Packages:
Package States: Red Hat Connectivity Link 1,
Full Details
CVE document
CVE-2025-40019
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406195
Bugzilla Description:
kernel: crypto: essiv - Check ssize for decryption and in-place encryption
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40018
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406196
Bugzilla Description:
kernel: ipvs: Defer ip_vs_ftp unregister during netns cleanup
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53733
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406197
Bugzilla Description:
kernel: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40023
Severity:
Released on: 24/10/2025
Advisory:
Bugzilla: 2406199
Bugzilla Description:
kernel: drm/xe/vf: Don't expose sysfs attributes not applicable for VFs
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40022
Severity:
Released on: 24/10/2025
Advisory:
Bugzilla: 2406200
Bugzilla Description:
kernel: crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40024
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406201
Bugzilla Description:
kernel: vhost: Take a reference on the task in struct vhost_task
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40021
Severity: low
Released on: 24/10/2025
Advisory:
Bugzilla: 2406202
Bugzilla Description:
kernel: tracing: dynevent: Add a missing lockdown check on dynevent
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40020
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406203
Bugzilla Description:
kernel: can: peak_usb: fix shift-out-of-bounds issue
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-682
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-52099
Severity: moderate
Released on: 24/10/2025
Advisory:
Bugzilla: 2406257
Bugzilla Description:
sqlite: SQLite integer overflow
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-57848
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2391099
Bugzilla Description:
container-native-virtualization: privilege escalation via excessive /etc/passwd permissions
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document
CVE-2025-12044
Severity: important
Released on: 23/10/2025
Advisory: RHSA-2025:21984, RHSA-2025:21981, RHSA-2025:22058, RHSA-2025:21988, RHSA-2025:21976,
Bugzilla: 2406098
Bugzilla Description:
github.com/hashicorp/vault: Vault Vulnerable to Denial of Service Due to Rate Limit Regression
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: rhtas/gitsign-rhel9:sha256:882d508ec7d71fb3e13ee240ee295ee91884700d63029bb58bd456b6d23fd5e0,rhtas/fulcio-rhel9:sha256:b19900ebbf9cac67196127a60ea2434a8ce2011b17bab15a0e7fc96cf38a63fa,rhtas/rekor-server-rhel9:sha256:799b0b86f83f0fdf450ecbd2726419570b15f6ec5ba5b814750d45b8269e4dac,rhtas/timestamp-authority-rhel9:sha256:7b3eb9108c50321278ccad2032b3fb365911df83084cca953dd068cdd51f7874,rhtas/policy-controller-rhel9:sha256:7172d6a08594cccd155c2f74110cfbafadb812af84bb6b75c8bec1e3c416bd26,rhtas/client-server-rhel9:sha256:cddda466bc9957f1c3902da3a0cf37ef3ec08f4aeb8c50a421405540120b75cf,rhtas/rekor-cli-rhel9:sha256:3782ef36eac0a40b3b8d018476d0af7505d2a81f0ccb993644e8c5f20f1cd566,rhtas/cosign-rhel9:sha256:a6f3dba2c7ec8cdf7a87a2e8679da66c2248b44c7e15611205f096a6c1629f88,
Package States: cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,external secrets operator for Red Hat OpenShift - Tech Preview,external secrets operator for Red Hat OpenShift - Tech Preview,OpenShift Pipelines,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Trusted Artifact Signer,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-11621
Severity: important
Released on: 23/10/2025
Advisory: RHSA-2025:21984, RHSA-2025:21981, RHSA-2025:22058, RHSA-2025:21988, RHSA-2025:21976,
Bugzilla: 2406096
Bugzilla Description:
github.com/hashicorp/vault: Vault AWS auth method bypass due to AWS client cache
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-288
Affected Packages: rhtas/gitsign-rhel9:sha256:882d508ec7d71fb3e13ee240ee295ee91884700d63029bb58bd456b6d23fd5e0,rhtas/fulcio-rhel9:sha256:b19900ebbf9cac67196127a60ea2434a8ce2011b17bab15a0e7fc96cf38a63fa,rhtas/rekor-server-rhel9:sha256:799b0b86f83f0fdf450ecbd2726419570b15f6ec5ba5b814750d45b8269e4dac,rhtas/timestamp-authority-rhel9:sha256:7b3eb9108c50321278ccad2032b3fb365911df83084cca953dd068cdd51f7874,rhtas/policy-controller-rhel9:sha256:7172d6a08594cccd155c2f74110cfbafadb812af84bb6b75c8bec1e3c416bd26,rhtas/client-server-rhel9:sha256:cddda466bc9957f1c3902da3a0cf37ef3ec08f4aeb8c50a421405540120b75cf,rhtas/rekor-cli-rhel9:sha256:3782ef36eac0a40b3b8d018476d0af7505d2a81f0ccb993644e8c5f20f1cd566,rhtas/cosign-rhel9:sha256:a6f3dba2c7ec8cdf7a87a2e8679da66c2248b44c7e15611205f096a6c1629f88,
Package States: cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,External Secrets Operator for Red Hat OpenShift,External Secrets Operator for Red Hat OpenShift,external secrets operator for Red Hat OpenShift - Tech Preview,external secrets operator for Red Hat OpenShift - Tech Preview,OpenShift Pipelines,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Trusted Artifact Signer,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,Zero Trust Workload Identity Manager - Tech Preview,
Full Details
CVE document
CVE-2025-23345
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406087
Bugzilla Description:
nvidia-display-driver: NVIDIA Display Driver out of bound read
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-23332
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406077
Bugzilla Description:
nvidia-display-driver: NVIDIA Display Driver null pointer dereference
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-23330
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406079
Bugzilla Description:
nvidia-display-driver: NVIDIA Display Driver null pointer dereference
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-23300
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406089
Bugzilla Description:
nvidia-display-driver: NVIDIA Display Driver Null pointer dereference
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-62813
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2405977
Bugzilla Description:
lz4: LZ4 null handling error
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-158
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-12105
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2405992
Bugzilla Description:
libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-12110
Severity: moderate
Released on: 23/10/2025
Advisory: RHSA-2025:22089, RHSA-2025:21370, RHSA-2025:21371, RHSA-2025:22088,
Bugzilla: 2406033
Bugzilla Description:
keycloak: org.keycloak:keycloak-services: User can refresh offline session even after client's offline_access scope was removed
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-613
Affected Packages: rhbk/keycloak-operator-bundle:26.4.4-1,rhbk/keycloak-rhel9-operator:26.4-3,rhbk/keycloak-operator-bundle:26.2.11-1,rhbk/keycloak-rhel9:26.4-3,rhbk/keycloak-rhel9-operator:26.2-12,keycloak-server,rhbk/keycloak-rhel9:26.2-12,
Package States:
Full Details
CVE document
CVE-2025-50949
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406045
Bugzilla Description:
fontforge: Fontforge memory leak
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-50951
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406046
Bugzilla Description:
fontforge: Fontforge memory leak
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-50950
Severity: moderate
Released on: 23/10/2025
Advisory:
Bugzilla: 2406048
Bugzilla Description:
audiofile: NULL pointer dereference in the ModuleState::setup function
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-62708
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405945
Bugzilla Description:
pypdf: pypdf manipulated LZWDecode streams can exhaust RAM
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-409
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-62707
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405943
Bugzilla Description:
pypdf: pypdf affected by possible infinite loop when reading DCT inline images without EOF marker
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-834
Affected Packages:
Package States: OpenShift Lightspeed,OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-11965
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405820
Bugzilla Description:
io.vertx/vertx-core: Eclipse Vert.x Access Control Flaw
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-552
Affected Packages:
Package States: Cryostat 4,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat build of OptaPlanner 8,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-11966
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405789
Bugzilla Description:
io.vertx/vertx-web: Eclipse Vert.x cross site scripting
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: (CWE-79|CWE-80)
Affected Packages:
Package States: Cryostat 4,Cryostat 4,Cryostat 4,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Apicurio Registry 3,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 2,Red Hat build of Debezium 2,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat build of Debezium 3,Red Hat build of Debezium 3,Red Hat build of OptaPlanner 8,Red Hat build of OptaPlanner 8,Red Hat build of Quarkus,Red Hat build of Quarkus,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Data Grid 8,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Process Automation 7,streams for Apache Kafka 2,streams for Apache Kafka 2,streams for Apache Kafka 2,streams for Apache Kafka 2,streams for Apache Kafka 2,streams for Apache Kafka 3,streams for Apache Kafka 3,streams for Apache Kafka 3,streams for Apache Kafka 3,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-11411
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405706
Bugzilla Description:
unbound: Unbound domain hijacking via promiscuous records
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-349
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2023-53705
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2024:3138, RHSA-2023:6583,
Bugzilla: 2405713
Bugzilla Description:
kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-125
Affected Packages: kernel-0:4.18.0-553.el8_10,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53706
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2405714
Bugzilla Description:
kernel: mm/vmemmap/devdax: fix kernel crash when probing devdax devices
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-843
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53720
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405715
Bugzilla Description:
kernel: net/mlx5e: Release the label when replacing existing ct entry
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50571
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405717
Bugzilla Description:
kernel: btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53732
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405718
Bugzilla Description:
kernel: fs/ntfs3: Fix NULL dereference in ni_write_inode
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53731
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405719
Bugzilla Description:
kernel: netlink: fix potential deadlock in netlink_set_err()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50581
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405720
Bugzilla Description:
kernel: hfs: fix OOB Read in __hfs_brec_find
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53699
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405721
Bugzilla Description:
kernel: riscv: move memblock_allow_resize() after linear mapping is ready
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53700
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405722
Bugzilla Description:
kernel: media: max9286: Fix memleak in max9286_v4l2_register()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53721
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405723
Bugzilla Description:
kernel: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50578
Severity: low
Released on: 22/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2405724
Bugzilla Description:
kernel: Linux kernel: Memory leak in __class_register()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53704
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405725
Bugzilla Description:
kernel: clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50565
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405726
Bugzilla Description:
kernel: wifi: plfxlc: fix potential memory leak in __lf_x_usb_enable_rx()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50556
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405727
Bugzilla Description:
kernel: drm: Fix potential null-ptr-deref due to drmm_mode_config_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53716
Severity: low
Released on: 22/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2405728
Bugzilla Description:
kernel: Linux kernel: Network subsystem memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50570
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405729
Bugzilla Description:
kernel: platform/chrome: fix memory corruption in ioctl
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53698
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2024:3138,
Bugzilla: 2405730
Bugzilla Description:
kernel: xsk: fix refcount underflow in error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50559
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405731
Bugzilla Description:
kernel: clk: imx: scu: fix memleak on platform_device_add() fails
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50567
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405732
Bugzilla Description:
kernel: fs: jfs: fix shift-out-of-bounds in dbAllocAG
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50566
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405733
Bugzilla Description:
kernel: mtd: Fix device name leak when register device failed in add_mtd_device()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50557
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405734
Bugzilla Description:
kernel: pinctrl: thunderbay: fix possible memory leak in thunderbay_build_functions()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50582
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2405735
Bugzilla Description:
kernel: regulator: core: Prevent integer underflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-191
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50575
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405736
Bugzilla Description:
kernel: xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50577
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405737
Bugzilla Description:
kernel: Linux kernel: IMA memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53730
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405738
Bugzilla Description:
kernel: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53725
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405739
Bugzilla Description:
kernel: clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53719
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405740
Bugzilla Description:
kernel: serial: arc_uart: fix of_iomap leak in `arc_serial_probe`
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53717
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2405741
Bugzilla Description:
kernel: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-787
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50576
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405742
Bugzilla Description:
kernel: serial: pch: Fix PCI device refcount leak in pch_request_dma()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53692
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405743
Bugzilla Description:
kernel: ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50580
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405744
Bugzilla Description:
kernel: blk-throttle: prevent overflow while calculating wait time
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53696
Severity: low
Released on: 22/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2405745
Bugzilla Description:
kernel: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50574
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405746
Bugzilla Description:
kernel: drm/omap: dss: Fix refcount leak bugs
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53693
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405747
Bugzilla Description:
kernel: USB: gadget: Fix the memory leak in raw_gadget driver
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50572
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405748
Bugzilla Description:
kernel: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53714
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405749
Bugzilla Description:
kernel: drm/stm: ltdc: fix late dereference check
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50573
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405750
Bugzilla Description:
kernel: wifi: mt76: mt7915: fix mt7915_rate_txpower_get() resource leaks
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50560
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405751
Bugzilla Description:
kernel: drm/meson: explicitly remove aggregate driver at module unload time
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53710
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2405752
Bugzilla Description:
kernel: wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53713
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2405753
Bugzilla Description:
kernel: arm64: sme: Use STR P to clear FFR context field in streaming SVE mode
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-787
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50562
Severity: low
Released on: 22/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2405754
Bugzilla Description:
kernel: tpm: acpi: Call acpi_put_table() to fix memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53724
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405755
Bugzilla Description:
kernel: mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53722
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2405756
Bugzilla Description:
kernel: md: raid1: fix potential OOB in raid1_remove_disk()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-125
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50563
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2405757
Bugzilla Description:
kernel: dm thin: Fix UAF in run_timer_softirq()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-416
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53709
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405758
Bugzilla Description:
kernel: ring-buffer: Handle race between rb_move_tail and rb_check_pages
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53723
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405759
Bugzilla Description:
kernel: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53701
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405760
Bugzilla Description:
kernel: netfilter: nf_tables: deactivate anonymous set from preparation phase
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53695
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405761
Bugzilla Description:
kernel: udf: Detect system inodes linked into directory hierarchy
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-754
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53702
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405762
Bugzilla Description:
kernel: s390/crypto: use vector instructions only if available for ChaCha20
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50561
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405763
Bugzilla Description:
kernel: iio: fix memory leak in iio_device_register_eventset()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50579
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405764
Bugzilla Description:
kernel: arm64: ftrace: fix module PLTs with mcount
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-754
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50569
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2405765
Bugzilla Description:
kernel: xfrm: Update ipcomp_scratches with NULL when freed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53707
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405766
Bugzilla Description:
kernel: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53728
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405767
Bugzilla Description:
kernel: posix-timers: Ensure timer ID search-loop limit is valid
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53726
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2405768
Bugzilla Description:
kernel: arm64: csum: Fix OoB access in IP checksum code for negative lengths
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-839
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53697
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2405771
Bugzilla Description:
kernel: nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53703
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405772
Bugzilla Description:
kernel: HID: amd_sfh: Fix for shift-out-of-bounds
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-1335
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53715
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405773
Bugzilla Description:
kernel: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex
CVSS Score:
CVSSv3 Score: 3.9
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53718
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405774
Bugzilla Description:
kernel: ring-buffer: Do not swap cpu_buffer during resize process
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-821
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53729
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405775
Bugzilla Description:
kernel: soc: qcom: qmi_encdec: Restrict string length in decode
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53727
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405776
Bugzilla Description:
kernel: net/sched: fq_pie: avoid stalls in fq_pie_timer()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50568
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405777
Bugzilla Description:
kernel: usb: gadget: f_hid: fix f_hidg lifetime vs cdev
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53694
Severity: moderate
Released on: 22/10/2025
Advisory:
Bugzilla: 2405778
Bugzilla Description:
kernel: riscv: ftrace: Fixup panic by disabling preemption
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-662
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53711
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405779
Bugzilla Description:
kernel: NFS: Fix a potential data corruption
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50564
Severity:
Released on: 22/10/2025
Advisory:
Bugzilla: 2405781
Bugzilla Description:
kernel: s390/netiucv: Fix return type of netiucv_tx()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50558
Severity: moderate
Released on: 22/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2405782
Bugzilla Description:
kernel: regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53708
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405783
Bugzilla Description:
kernel: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53712
Severity: low
Released on: 22/10/2025
Advisory:
Bugzilla: 2405784
Bugzilla Description:
kernel: ARM: 9317/1: kexec: Make smp stop calls asynchronous
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40778
Severity: important
Released on: 22/10/2025
Advisory: RHSA-2025:19912, RHSA-2025:19835, RHSA-2025:21741, RHSA-2025:19950, RHSA-2025:21994, RHSA-2025:19793, RHSA-2025:22205, RHSA-2025:21887, RHSA-2025:21110, RHSA-2025:21034, RHSA-2025:21111, RHSA-2025:19951, RHSA-2025:21740, RHSA-2025:22168, RHSA-2025:21939, RHSA-2025:21817, RHSA-2025:21735, RHSA-2025:21889, RHSA-2025:21736,
Bugzilla: 2405827
Bugzilla Description:
bind: Cache poisoning attacks with unsolicited RRs
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-347
Affected Packages: bind-32:9.16.23-31.el9_6.2,bind-32:9.11.36-8.el8_8.8,bind9.18-32:9.18.29-4.el9_6.2,bind-32:9.11.36-16.el8_10.6,bind-32:9.11.4-26.P2.el7_9.19,bind-32:9.16.23-1.el9_0.11,bind-32:9.18.33-10.el10_1.2,bind-32:9.18.33-4.el10_0.2,bind-32:9.16.23-34.el9_7.1,bind-32:9.16.23-18.el9_4.10,bind-32:9.11.13-6.el8_2.11,bind9.16-32:9.16.23-0.14.el8_8.7,bind-32:9.16.23-11.el9_2.9,bind-32:9.11.36-3.el8_6.11,bind9.18-32:9.18.29-5.el9_7.2,bind9.16-32:9.16.23-0.22.el8_10.4,discovery/discovery-ui-rhel9:sha256:69cb9c84b806ee2f448bdbbcf3174855432f5caec8f31ca2a345655da4a72f57,bind-32:9.11.26-4.el8_4.8,bind9.16-32:9.16.23-0.7.el8_6.9,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-40780
Severity: important
Released on: 22/10/2025
Advisory: RHSA-2025:19912, RHSA-2025:19950, RHSA-2025:21994, RHSA-2025:19793, RHSA-2025:21887, RHSA-2025:21110, RHSA-2025:21034, RHSA-2025:21111, RHSA-2025:19951, RHSA-2025:22168, RHSA-2025:21939, RHSA-2025:21817, RHSA-2025:21889,
Bugzilla: 2405829
Bugzilla Description:
bind: Cache poisoning due to weak PRNG
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-338
Affected Packages: bind-32:9.16.23-31.el9_6.2,bind9.18-32:9.18.29-4.el9_6.2,bind-32:9.16.23-1.el9_0.11,bind-32:9.18.33-10.el10_1.2,bind-32:9.18.33-4.el10_0.2,bind-32:9.16.23-34.el9_7.1,bind-32:9.16.23-18.el9_4.10,bind9.16-32:9.16.23-0.14.el8_8.7,bind-32:9.16.23-11.el9_2.9,bind9.18-32:9.18.29-5.el9_7.2,bind9.16-32:9.16.23-0.22.el8_10.4,discovery/discovery-ui-rhel9:sha256:310df392f638ef6eca1a26db024ae2cb617db5932f886d2acddc92fb7289e740,bind9.16-32:9.16.23-0.7.el8_6.9,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-8677
Severity: important
Released on: 22/10/2025
Advisory: RHSA-2025:19950, RHSA-2025:21994, RHSA-2025:21034, RHSA-2025:21111, RHSA-2025:19912,
Bugzilla: 2405830
Bugzilla Description:
bind: Resource exhaustion via malformed DNSKEY handling
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages: bind9.18-32:9.18.29-4.el9_6.2,discovery/discovery-ui-rhel9:sha256:310df392f638ef6eca1a26db024ae2cb617db5932f886d2acddc92fb7289e740,bind-32:9.18.33-10.el10_1.2,bind-32:9.18.33-4.el10_0.2,bind9.18-32:9.18.29-5.el9_7.2,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-53066
Severity: moderate
Released on: 21/10/2025
Advisory: RHSA-2025:18819, RHSA-2025:18824, RHSA-2025:18825, RHSA-2025:18814, RHSA-2025:18822, RHSA-2025:18823, RHSA-2025:18817, RHSA-2025:18818, RHSA-2025:18826, RHSA-2025:18815, RHSA-2025:22370, RHSA-2025:18816, RHSA-2025:18820, RHSA-2025:21485, RHSA-2025:18821,
Bugzilla: 2403063
Bugzilla Description:
openjdk: Enhance Path Factories (Oracle CPU 2025-10)
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE:
Affected Packages: java-1.8.0-openjdk-1:1.8.0.472.b08-1.el7_9,java-17-openjdk-1:17.0.17.0.10-1.el8,java-21-openjdk-portable,java-17-openjdk-1:17.0.17.0.10-1.el9,java-11-openjdk-1:11.0.29.0.7-1.el7_9,java-21-openjdk-windows,java-1.8.0-ibm-1:1.8.0.8.55-1.el8_10,java-1.8.0-openjdk-windows,java-21-openjdk-1:21.0.9.0.10-1.el10,java-11-openjdk-portable,java-11-openjdk-windows,java-21-openjdk-1:21.0.9.0.10-1.el8,java-17-openjdk-portable,java-11-openjdk-1:11.0.29.0.7-1.el8,java-17-openjdk-windows,java-25-openjdk-1:25.0.1.0.8-2.el10,java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8,java-11-openjdk-1:11.0.29.0.7-1.el9,java-1.8.0-openjdk-portable,java-1.8.0-openjdk-1:1.8.0.472.b08-1.el9,java-21-openjdk-1:21.0.9.0.10-1.el9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-61748
Severity: moderate
Released on: 21/10/2025
Advisory: RHSA-2025:21485, RHSA-2025:18824, RHSA-2025:18825, RHSA-2025:18826,
Bugzilla: 2403064
Bugzilla Description:
openjdk: Enhance String handling (Oracle CPU 2025-10)
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-581
Affected Packages: java-21-openjdk-portable,java-21-openjdk-1:21.0.9.0.10-1.el10,java-21-openjdk-1:21.0.9.0.10-1.el8,java-21-openjdk-windows,java-25-openjdk-1:25.0.1.0.8-2.el10,java-21-openjdk-1:21.0.9.0.10-1.el9,
Package States: Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 11 ELS,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 1.8,Red Hat build of OpenJDK 1.8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53057
Severity: moderate
Released on: 21/10/2025
Advisory: RHSA-2025:18819, RHSA-2025:18824, RHSA-2025:18825, RHSA-2025:18814, RHSA-2025:18822, RHSA-2025:18823, RHSA-2025:18817, RHSA-2025:18818, RHSA-2025:18826, RHSA-2025:18815, RHSA-2025:22370, RHSA-2025:18816, RHSA-2025:18820, RHSA-2025:21485, RHSA-2025:18821,
Bugzilla: 2403082
Bugzilla Description:
openjdk: Enhance certificate handling (Oracle CPU 2025-10)
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-838
Affected Packages: java-1.8.0-openjdk-1:1.8.0.472.b08-1.el7_9,java-17-openjdk-1:17.0.17.0.10-1.el8,java-21-openjdk-portable,java-17-openjdk-1:17.0.17.0.10-1.el9,java-11-openjdk-1:11.0.29.0.7-1.el7_9,java-21-openjdk-windows,java-1.8.0-ibm-1:1.8.0.8.55-1.el8_10,java-1.8.0-openjdk-windows,java-21-openjdk-1:21.0.9.0.10-1.el10,java-11-openjdk-portable,java-11-openjdk-windows,java-21-openjdk-1:21.0.9.0.10-1.el8,java-17-openjdk-portable,java-11-openjdk-1:11.0.29.0.7-1.el8,java-17-openjdk-windows,java-25-openjdk-1:25.0.1.0.8-2.el10,java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8,java-11-openjdk-1:11.0.29.0.7-1.el9,java-1.8.0-openjdk-portable,java-1.8.0-openjdk-1:1.8.0.472.b08-1.el9,java-21-openjdk-1:21.0.9.0.10-1.el9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-53069
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405541
Bugzilla Description:
mysql: Components Services unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53067
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405521
Bugzilla Description:
mysql: Optimizer unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53062
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405511
Bugzilla Description:
mysql: InnoDB unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53053
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405486
Bugzilla Description:
mysql: DML unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53054
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405514
Bugzilla Description:
mysql: InnoDB unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53044
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405491
Bugzilla Description:
mysql: InnoDB unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53045
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405523
Bugzilla Description:
mysql: InnoDB unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53042
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405544
Bugzilla Description:
mysql: Optimizer unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-53040
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405534
Bugzilla Description:
mysql: Optimizer unspecified vulnerability (CPU Oct 2025)
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-62595
Severity: moderate
Released on: 21/10/2025
Advisory:
Bugzilla: 2405387
Bugzilla Description:
koa: Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-601
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Developer Hub,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-62518
Severity: important
Released on: 21/10/2025
Advisory:
Bugzilla: 2405382
Bugzilla Description:
astral-tokio-tar: astral-tokio-tar Vulnerable to PAX Header Desynchronization
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-843
Affected Packages:
Package States: Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Confidential Compute Attestation,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-62522
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405222
Bugzilla Description:
vite: vite allows server.fs.deny bypass via backslash on Windows
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-40006
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405113
Bugzilla Description:
kernel: mm/hugetlb: fix folio is still mapped when deleted
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-667
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-41390
Severity: important
Released on: 20/10/2025
Advisory:
Bugzilla: 2405112
Bugzilla Description:
TruffleHog: specially crafted git repository can lead to arbitrary code execution
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-829
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document
CVE-2025-11680
Severity: low
Released on: 20/10/2025
Advisory:
Bugzilla: 2405135
Bugzilla Description:
libwebsockets: Out-of-bounds Write in libwebsockets PNG parsing
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-787
Affected Packages:
Package States: A-MQ Interconnect 1,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat Service Interconnect 2,
Full Details
CVE document
CVE-2025-11679
Severity: low
Released on: 20/10/2025
Advisory:
Bugzilla: 2405115
Bugzilla Description:
libwebsockets: Out-of-bounds Read in libwebsockets PNG parsing
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: A-MQ Interconnect 1,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat Service Interconnect 2,
Full Details
CVE document
CVE-2025-11678
Severity: important
Released on: 20/10/2025
Advisory:
Bugzilla: 2405139
Bugzilla Description:
libwebsockets: Stack-based Buffer Overflow in libwebsockets
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-121
Affected Packages:
Package States: Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat Service Interconnect 2,
Full Details
CVE document
CVE-2025-11677
Severity: low
Released on: 20/10/2025
Advisory:
Bugzilla: 2405127
Bugzilla Description:
libwebsockets: Use After Free in libwebsockets WebSocket server
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: A-MQ Interconnect 1,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat Service Interconnect 2,
Full Details
CVE document
CVE-2025-40004
Severity:
Released on: 20/10/2025
Advisory:
Bugzilla: 2405052
Bugzilla Description:
kernel: net/9p: Fix buffer overflow in USB transport layer
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40013
Severity:
Released on: 20/10/2025
Advisory:
Bugzilla: 2405114
Bugzilla Description:
kernel: ASoC: qcom: audioreach: fix potential null pointer dereference
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40012
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405117
Bugzilla Description:
kernel: net/smc: fix warning in smc_rx_splice() when calling get_page()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40015
Severity:
Released on: 20/10/2025
Advisory:
Bugzilla: 2405123
Bugzilla Description:
kernel: media: stm32-csi: Fix dereference before NULL check
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40010
Severity: low
Released on: 20/10/2025
Advisory:
Bugzilla: 2405128
Bugzilla Description:
kernel: afs: Fix potential null pointer dereference in afs_put_server
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40016
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405130
Bugzilla Description:
kernel: media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40007
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405132
Bugzilla Description:
kernel: netfs: fix reference leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40009
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405133
Bugzilla Description:
kernel: fs/proc/task_mmu: check p->vec_buf for NULL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40005
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405134
Bugzilla Description:
kernel: spi: cadence-quadspi: Implement refcount to handle unbind during busy
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40011
Severity: moderate
Released on: 20/10/2025
Advisory:
Bugzilla: 2405137
Bugzilla Description:
kernel: drm/gma500: Fix null dereference in hdmi teardown
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40008
Severity:
Released on: 20/10/2025
Advisory:
Bugzilla: 2405138
Bugzilla Description:
kernel: kmsan: fix out-of-bounds access to shadow memory
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40017
Severity:
Released on: 20/10/2025
Advisory:
Bugzilla: 2405141
Bugzilla Description:
kernel: media: iris: Fix memory leak by freeing untracked persist buffer
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40001
Severity: moderate
Released on: 18/10/2025
Advisory:
Bugzilla: 2404901
Bugzilla Description:
kernel: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40003
Severity:
Released on: 18/10/2025
Advisory:
Bugzilla: 2404903
Bugzilla Description:
kernel: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40002
Severity:
Released on: 18/10/2025
Advisory:
Bugzilla: 2404904
Bugzilla Description:
kernel: thunderbolt: Fix use-after-free in tb_dp_dprx_work
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-62171
Severity: moderate
Released on: 17/10/2025
Advisory:
Bugzilla: 2404735
Bugzilla Description:
ImageMagick: ImageMagick vulnerable to denial of service via integer overflow in BMP decoder on 32-bit systems
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-62168
Severity: important
Released on: 17/10/2025
Advisory: RHSA-2025:21090, RHSA-2025:21065, RHSA-2025:19967, RHSA-2025:19114, RHSA-2025:19167, RHSA-2025:19277, RHSA-2025:19398, RHSA-2025:21066, RHSA-2025:19107, RHSA-2025:19118, RHSA-2025:21002, RHSA-2025:19115, RHSA-2025:20935,
Bugzilla: 2404736
Bugzilla Description:
squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-209
Affected Packages: squid:4-8100020251023131551.489197e6,squid-7:3.5.20-17.el7_9.15,squid:4-8020020251028004321.4cda2c84,squid-7:5.5-19.el9_6.2,squid:4-8040020251024000101.522a0ee4,squid:4-8080020251029094904.63b34585,squid-7:5.2-1.el9_0.9,squid-7:5.5-22.el9_7.1,squid-7:5.5-13.el9_4.4,squid-7:6.10-6.el10_1.1,squid-7:5.5-5.el9_2.10,squid:4-8060020251027230224.ad008a3a,squid-7:6.10-5.el10_0.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-26625
Severity: important
Released on: 17/10/2025
Advisory:
Bugzilla: 2404720
Bugzilla Description:
git-lfs: Git LFS may write to arbitrary files via crafted symlinks
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-59
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-49655
Severity: important
Released on: 17/10/2025
Advisory: RHSA-2025:22068,
Bugzilla: 2404722
Bugzilla Description:
keras: Keras deserialization of untrusted data
CVSS Score:
CVSSv3 Score: 8.4
Vector:
CWE: CWE-502
Affected Packages: rhtas/model-transparency-rhel9:sha256:cdbf79af3951e2830df94331a890ab8f1e2649db72e96bec57fee61fc9add1e6,
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2024-31573
Severity: moderate
Released on: 17/10/2025
Advisory:
Bugzilla: 2404780
Bugzilla Description:
org.xmlunit/xmlunit-core: XMLUnit Insecure Defaults when Processing XSLT Stylesheets
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-669
Affected Packages:
Package States: AMQ Clients,Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat build of Apicurio Registry 3,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-62504
Severity: moderate
Released on: 16/10/2025
Advisory:
Bugzilla: 2404627
Bugzilla Description:
envoy: Envoy Lua filter use-after-free when oversized rewritten response body causes crash
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,
Full Details
CVE document
CVE-2025-62409
Severity: moderate
Released on: 16/10/2025
Advisory:
Bugzilla: 2404524
Bugzilla Description:
envoy-main: Envoy TCP connection pool crash
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,
Full Details
CVE document
CVE-2025-11840
Severity: low
Released on: 16/10/2025
Advisory:
Bugzilla: 2404481
Bugzilla Description:
binutils: GNU Binutils out-of-bounds read
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-119|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-41254
Severity: moderate
Released on: 16/10/2025
Advisory:
Bugzilla: 2404437
Bugzilla Description:
org.springframework/spring-core: Spring Framework STOMP CSRF Vulnerability
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-352
Affected Packages:
Package States: AMQ Clients,Logging Subsystem for Red Hat OpenShift,Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document
CVE-2025-11839
Severity: low
Released on: 16/10/2025
Advisory:
Bugzilla: 2404439
Bugzilla Description:
binutils: GNU Binutils prdbg.c tg_tag_type return value
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-252|CWE-253)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11683
Severity: moderate
Released on: 16/10/2025
Advisory:
Bugzilla: 2404319
Bugzilla Description:
yaml-syck: YAML::Syck potential Information Disclosure
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document
CVE-2025-62375
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404275
Bugzilla Description:
github.com/in-toto/go-witness: go-witness Improper Verification of AWS EC2 Identity Documents
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-295
Affected Packages:
Package States: OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,
Full Details
CVE document
CVE-2025-62410
Severity: important
Released on: 15/10/2025
Advisory:
Bugzilla: 2404254
Bugzilla Description:
happy-dom: --disallow-code-generation-from-strings is not sufficient for isolating untrusted JavaScript in happy-dom
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-1321
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-59419
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404232
Bugzilla Description:
io.netty/netty-codec-smtp: Netty netty-codec-smtp SMTP Command Injection
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-93
Affected Packages:
Package States: AMQ Clients,Logging Subsystem for Red Hat OpenShift,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-55247
Severity: moderate
Released on: 15/10/2025
Advisory: RHSA-2025:18256, RHSA-2025:18148, RHSA-2025:18149, RHSA-2025:18151, RHSA-2025:18150, RHSA-2025:18153, RHSA-2025:18152,
Bugzilla: 2403086
Bugzilla Description:
dotnet: .NET Denial of Service Vulnerability
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-377
Affected Packages: dotnet8.0-0:8.0.121-1.el9_6,dotnet9.0-0:9.0.111-1.el10_0,dotnet8.0-0:8.0.121-1.el10_0,dotnet9.0-0:9.0.111-1.el9_6,dotnet8.0-0:8.0.121-1.el9_4,dotnet8.0-0:8.0.121-1.el8_10,dotnet9.0-0:9.0.111-1.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-55315
Severity: important
Released on: 15/10/2025
Advisory: RHBA-2025:20993, RHSA-2025:18256, RHSA-2025:18148, RHSA-2025:18149, RHSA-2025:18151, RHSA-2025:18150, RHSA-2025:18153, RHSA-2025:18152, RHBA-2025:20916,
Bugzilla: 2403085
Bugzilla Description:
dotnet: .NET Security Feature Bypass Vulnerability
CVSS Score:
CVSSv3 Score: 8.5
Vector:
CWE: CWE-444
Affected Packages: dotnet8.0-0:8.0.121-1.el9_6,dotnet9.0-0:9.0.111-1.el10_0,dotnet8.0-0:8.0.121-1.el10_0,dotnet9.0-0:9.0.111-1.el9_6,dotnet10.0-0:10.0.100~rc.2.25502.107-0.12.el10_1,dotnet10.0-0:10.0.100~rc.2.25502.107-0.10.el9_7,dotnet8.0-0:8.0.121-1.el9_4,dotnet8.0-0:8.0.121-1.el8_10,dotnet9.0-0:9.0.111-1.el8_10,
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-10230
Severity: critical
Released on: 15/10/2025
Advisory:
Bugzilla: 2394377
Bugzilla Description:
samba: Command Injection in WINS Server Hook Script
CVSS Score:
CVSSv3 Score: 10.0
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-9640
Severity: important
Released on: 15/10/2025
Advisory:
Bugzilla: 2391698
Bugzilla Description:
samba: vfs_streams_xattr uninitialized memory write possible
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-55248
Severity: important
Released on: 15/10/2025
Advisory: RHSA-2025:18256, RHSA-2025:18148, RHSA-2025:18149, RHSA-2025:18151, RHSA-2025:18150, RHSA-2025:18153, RHSA-2025:18152,
Bugzilla: 2403083
Bugzilla Description:
dotnet: .NET Information Disclosure Vulnerability
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-319
Affected Packages: dotnet8.0-0:8.0.121-1.el9_6,dotnet9.0-0:9.0.111-1.el10_0,dotnet8.0-0:8.0.121-1.el10_0,dotnet9.0-0:9.0.111-1.el9_6,dotnet8.0-0:8.0.121-1.el9_4,dotnet8.0-0:8.0.121-1.el8_10,dotnet9.0-0:9.0.111-1.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-39988
Severity:
Released on: 15/10/2025
Advisory:
Bugzilla: 2404093
Bugzilla Description:
kernel: can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39978
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404094
Bugzilla Description:
kernel: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39976
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404095
Bugzilla Description:
kernel: futex: Use correct exit on failure from futex_hash_allocate_default()
CVSS Score:
CVSSv3 Score: 4.5
Vector:
CWE: CWE-703
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39980
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404096
Bugzilla Description:
kernel: nexthop: Forbid FDB status change while nexthop is in a group
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39969
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404097
Bugzilla Description:
kernel: i40e: fix validation of VF state in get resources
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39974
Severity: low
Released on: 15/10/2025
Advisory:
Bugzilla: 2404098
Bugzilla Description:
kernel: tracing/osnoise: Fix slab-out-of-bounds in _parse_integer_limit()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39985
Severity:
Released on: 15/10/2025
Advisory:
Bugzilla: 2404099
Bugzilla Description:
kernel: can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39982
Severity: moderate
Released on: 15/10/2025
Advisory: RHSA-2025:21469,
Bugzilla: 2404100
Bugzilla Description:
kernel: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-416
Affected Packages: kernel-0:5.14.0-611.8.1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39986
Severity:
Released on: 15/10/2025
Advisory:
Bugzilla: 2404102
Bugzilla Description:
kernel: can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39987
Severity:
Released on: 15/10/2025
Advisory:
Bugzilla: 2404103
Bugzilla Description:
kernel: can: hi311x: populate ndo_change_mtu() to prevent buffer overflow
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39967
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404104
Bugzilla Description:
kernel: fbcon: fix integer overflow in fbcon_do_set_font
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39981
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404105
Bugzilla Description:
kernel: Bluetooth: MGMT: Fix possible UAFs
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39975
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404106
Bugzilla Description:
kernel: smb: client: fix wrong index reference in smb2_compound_op()
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-1285
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39966
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404107
Bugzilla Description:
kernel: iommufd: Fix race during abort for file descriptors
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39971
Severity: moderate
Released on: 15/10/2025
Advisory: RHSA-2025:21920, RHSA-2025:21469, RHSA-2025:21917, RHSA-2025:21933,
Bugzilla: 2404108
Bugzilla Description:
kernel: i40e: fix idx validation in config queues msg
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-787
Affected Packages: kernel-rt-0:4.18.0-553.85.1.rt7.426.el8_10,kernel-0:4.18.0-553.85.1.el8_10,kernel-0:5.14.0-611.8.1.el9_7,kernel-0:5.14.0-570.66.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39979
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404109
Bugzilla Description:
kernel: net/mlx5: fs, fix UAF in flow counter release
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39972
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404110
Bugzilla Description:
kernel: i40e: fix idx validation in i40e_validate_queue_map
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39984
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404111
Bugzilla Description:
kernel: net: tun: Update napi->skb after XDP process
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39970
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404112
Bugzilla Description:
kernel: i40e: fix input validation logic for action_meta
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39977
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404113
Bugzilla Description:
kernel: futex: Prevent use-after-free during requeue-PI
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39990
Severity: low
Released on: 15/10/2025
Advisory:
Bugzilla: 2404114
Bugzilla Description:
kernel: bpf: Check the helper function is valid in get_helper_proto
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39968
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404115
Bugzilla Description:
kernel: i40e: add max boundary check for VF filters
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39973
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404116
Bugzilla Description:
kernel: i40e: add validation for ring_len param
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39983
Severity: moderate
Released on: 15/10/2025
Advisory: RHSA-2025:21469,
Bugzilla: 2404117
Bugzilla Description:
kernel: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages: kernel-0:5.14.0-611.8.1.el9_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-40000
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404120
Bugzilla Description:
kernel: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39993
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404121
Bugzilla Description:
kernel: media: rc: fix races with imon_disconnect()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39991
Severity: low
Released on: 15/10/2025
Advisory:
Bugzilla: 2404122
Bugzilla Description:
kernel: wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39994
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404123
Bugzilla Description:
kernel: media: tuner: xc5000: Fix use-after-free in xc5000_release
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39992
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404124
Bugzilla Description:
kernel: mm: swap: check for stable address space before operating on the VMA
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39995
Severity:
Released on: 15/10/2025
Advisory:
Bugzilla: 2404125
Bugzilla Description:
kernel: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39999
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404126
Bugzilla Description:
kernel: blk-mq: fix blk_mq_tags double free while nr_requests grown
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-1341
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39997
Severity: low
Released on: 15/10/2025
Advisory:
Bugzilla: 2404127
Bugzilla Description:
kernel: ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39996
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404128
Bugzilla Description:
kernel: media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39998
Severity: moderate
Released on: 15/10/2025
Advisory:
Bugzilla: 2404129
Bugzilla Description:
kernel: scsi: target: target_core_configfs: Add length check to avoid buffer overflow
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-59288
Severity: moderate
Released on: 14/10/2025
Advisory:
Bugzilla: 2403843
Bugzilla Description:
playwright: Playwright Spoofing Vulnerability
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-347
Affected Packages:
Package States: Migration Toolkit for Virtualization,Multicluster Global Hub,OpenShift Serverless,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,streams for Apache Kafka 2,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-62157
Severity: moderate
Released on: 14/10/2025
Advisory:
Bugzilla: 2403815
Bugzilla Description:
github.com/argoproj/argo-workflows: Argo Workflows exposes artifact repository credentials
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-522
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-62156
Severity: important
Released on: 14/10/2025
Advisory:
Bugzilla: 2403800
Bugzilla Description:
github.com/argoproj/argo-workflows: Argo Workflows Zip Slip
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-11721
Severity: important
Released on: 14/10/2025
Advisory:
Bugzilla: 2403771
Bugzilla Description:
thunderbird: firefox: Memory safety bug fixed in Firefox 144 and Thunderbird 144
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11719
Severity: moderate
Released on: 14/10/2025
Advisory:
Bugzilla: 2403764
Bugzilla Description:
thunderbird: firefox: Use-after-free caused by the native messaging web extension API on Windows
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11715
Severity: important
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403774
Bugzilla Description:
thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-119
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11713
Severity: moderate
Released on: 14/10/2025
Advisory:
Bugzilla: 2403767
Bugzilla Description:
thunderbird: firefox: Potential user-assisted code execution in “Copy as cURL” command
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-88
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11708
Severity: important
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403769
Bugzilla Description:
thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance()
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-416
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11712
Severity: moderate
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403770
Bugzilla Description:
thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-436
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11714
Severity: important
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403763
Bugzilla Description:
thunderbird: firefox: Memory safety bugs
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-119
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11710
Severity: important
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403768
Bugzilla Description:
thunderbird: firefox: Cross-process information leaked due to malicious IPC messages
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-497
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11711
Severity: important
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403776
Bugzilla Description:
thunderbird: firefox: Some non-writable Object properties could be modified
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-284
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11709
Severity: important
Released on: 14/10/2025
Advisory: RHSA-2025:19944, RHSA-2025:21064, RHSA-2025:21054, RHSA-2025:19945, RHSA-2025:19939, RHSA-2025:19938, RHSA-2025:19278, RHSA-2025:18155, RHSA-2025:18321, RHSA-2025:21059, RHSA-2025:18154, RHSA-2025:18320, RHSA-2025:21055, RHSA-2025:19942, RHSA-2025:21056, RHSA-2025:19943, RHSA-2025:18983, RHSA-2025:21057, RHSA-2025:19941, RHSA-2025:21058, RHSA-2025:18285,
Bugzilla: 2403765
Bugzilla Description:
thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: (CWE-787|CWE-125)
Affected Packages: firefox-0:140.4.0-3.el8_8,firefox-0:140.4.0-4.el7_9,firefox-0:140.4.0-3.el10_0,firefox-0:140.4.0-3.el9_0,firefox-0:140.4.0-3.el8_2,firefox-0:140.4.0-3.el9_2,firefox-0:140.4.0-3.el8_4,firefox-0:140.4.0-3.el9_4,firefox-0:140.4.0-3.el8_6,firefox-0:140.4.0-3.el9_6,thunderbird-0:140.4.0-2.el9_4,thunderbird-0:140.4.0-2.el8_6,thunderbird-0:140.4.0-2.el9_6,thunderbird-0:140.4.0-2.el8_8,firefox-0:140.4.0-3.el8_10,thunderbird-0:140.4.0-2.el10_0,thunderbird-0:140.4.0-2.el8_10,thunderbird-0:140.4.0-2.el9_0,thunderbird-0:140.4.0-2.el8_2,thunderbird-0:140.4.0-2.el9_2,thunderbird-0:140.4.0-2.el8_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11731
Severity: low
Released on: 14/10/2025
Advisory:
Bugzilla: 2403688
Bugzilla Description:
libxslt: Type Confusion in exsltFuncResultCompfunction of libxslt
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-843
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11568
Severity: moderate
Released on: 14/10/2025
Advisory:
Bugzilla: 2404244
Bugzilla Description:
luksmeta: Data corruption when handling LUKS1 partitions with luksmeta
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-1284
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11695
Severity: important
Released on: 13/10/2025
Advisory:
Bugzilla: 2403578
Bugzilla Description:
mongodb: MongoDB rust driver may unexpectedly disable certificate validation
CVSS Score:
CVSSv3 Score: 8.0
Vector:
CWE: CWE-295
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document
CVE-2025-7707
Severity: moderate
Released on: 13/10/2025
Advisory:
Bugzilla: 2403577
Bugzilla Description:
llama-index: World-Writable Cache Directory Vulnerability in llama_index
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-377
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document
CVE-2025-39964
Severity: moderate
Released on: 13/10/2025
Advisory:
Bugzilla: 2403545
Bugzilla Description:
kernel: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39965
Severity: moderate
Released on: 13/10/2025
Advisory:
Bugzilla: 2403546
Bugzilla Description:
kernel: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-43343
Severity: important
Released on: 13/10/2025
Advisory: RHSA-2025:19919, RHSA-2025:19920, RHSA-2025:18070, RHSA-2025:19946, RHSA-2025:19913, RHSA-2025:19914, RHSA-2025:19918, RHSA-2025:20922, RHSA-2025:19915, RHSA-2025:19916, RHSA-2025:18097,
Bugzilla: 2403598
Bugzilla Description:
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-119
Affected Packages: webkitgtk4-0:2.50.1-1.el7_9,webkit2gtk3-0:2.50.1-1.el8_6,webkit2gtk3-0:2.50.1-1.el9_4,webkit2gtk3-0:2.50.1-1.el8_10,webkit2gtk3-0:2.50.1-1.el8_8,webkit2gtk3-0:2.50.1-1.el9_7,webkit2gtk3-0:2.50.1-1.el8_2,webkit2gtk3-0:2.50.1-1.el9_0,webkit2gtk3-0:2.50.1-1.el8_4,webkit2gtk3-0:2.50.1-1.el9_2,webkit2gtk3-0:2.50.1-0.el9_6,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,
Full Details
CVE document
CVE-2025-11626
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403225
Bugzilla Description:
wireshark: MONGO dissector infinite loop
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-52885
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403224
Bugzilla Description:
poppler: Use-After-Free in StructTreeRoot class
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61912
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403230
Bugzilla Description:
python-ldap: python-ldap Vulnerable to Improper Encoding or Escaping of Output and Improper Null Termination
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-116|CWE-170)
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-61911
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403228
Bugzilla Description:
python-ldap: sanitization bypass in ldap.filter.escape_filter_chars
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: (CWE-75|CWE-843)
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-61927
Severity: important
Released on: 10/10/2025
Advisory:
Bugzilla: 2403177
Bugzilla Description:
happy-dom: Happy-DOM VM Context Escape
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-61921
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403178
Bugzilla Description:
sinatra: Sinatra has ReDoS vulnerability in ETag header value generation
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-61920
Severity: important
Released on: 10/10/2025
Advisory: RHSA-2025:22287, RHSA-2025:22182,
Bugzilla: 2403179
Bugzilla Description:
authlib: Authlib Denial of Service
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: (CWE-20|CWE-400|CWE-770)
Affected Packages: quay/quay-rhel8:sha256:cb10c70bfb9d8dc3f7bc75506901cd84af0cd11e21883f78d651838eaa83c16c,quay/quay-rhel8:sha256:a6813e5bf29916abf84b2d120a30cda07edf06f735c860ee4d0510ed0c59633b,
Package States:
Full Details
CVE document
CVE-2025-61919
Severity: important
Released on: 10/10/2025
Advisory: RHSA-2025:19647, RHSA-2025:19856, RHSA-2025:19736, RHSA-2025:19719, RHSA-2025:19948, RHSA-2025:20962, RHSA-2025:19513, RHSA-2025:19733, RHSA-2025:19832, RHSA-2025:19734, RHSA-2025:19800, RHSA-2025:19855, RHSA-2025:21036, RHSA-2025:21696, RHSA-2025:19512,
Bugzilla: 2403180
Bugzilla Description:
rubygem-rack: Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages: pcs-0:0.10.12-6.el8_6.10,rubygem-rack-0:2.2.20-1.el8sat,pcs-0:0.10.15-4.el8_8.9,pcs-0:0.11.7-2.el9_4.5,pcs-0:0.11.1-10.el9_0.9,pcs-0:0.11.10-1.el9_7.1,pcs-0:0.10.18-2.el8_10.7,pcs-0:0.11.4-7.el9_2.6,pcs-0:0.9.169-3.el7_9.5,pcs-0:0.12.0-3.el10_0.3,pcs-0:0.12.1-1.el10_1.1,rubygem-rack-0:2.2.20-1.el9sat,pcs-0:0.11.9-2.el9_6.2,pcs-0:0.10.8-1.el8_4.8,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-23282
Severity: important
Released on: 10/10/2025
Advisory:
Bugzilla: 2403160
Bugzilla Description:
kvm: NVIDIA Display Driver vulnerability due to race condition leading to escalate privileges
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8 Advanced Virtualization,Red Hat Enterprise Linux 8 Advanced Virtualization,Red Hat Enterprise Linux 8 Advanced Virtualization,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61780
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403126
Bugzilla Description:
rubygem-rack: Improper handling of headers in `Rack::Sendfile` may allow proxy bypass
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: (CWE-200|CWE-441|CWE-913)
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-59530
Severity: moderate
Released on: 10/10/2025
Advisory: RHSA-2025:21775, RHSA-2025:21892, RHSA-2025:21706, RHSA-2025:21768,
Bugzilla: 2403125
Bugzilla Description:
github.com/quic-go/quic-go: quic-go Crash Due to Premature HANDSHAKE_DONE Frame
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-617|CWE-755)
Affected Packages: receptor-0:1.6.2-1.el8ap,rhacm2/lighthouse-agent-rhel9:sha256:efb1d8f17a92ad94d8782856cd0a2db1b00c183b981a53e49ee0a1af49e61542,ansible-automation-platform-26/receptor-rhel9:sha256:003d666fa23781f74864de69b60d12abbd1f1e390db706657c01c5d1ffd40750,receptor-0:1.6.2-2.el9ap,rhacm2/lighthouse-coredns-rhel9:sha256:6b89cc6b664a68b5cdaa81a1485322a9fc60dd209bd9dccd4e700b405c89c702,ansible-automation-platform-26/ee-supported-rhel9:sha256:fe46975188a191d1232e3a524f1558436b7a9806b751f6d289f1fec9f924dbb6,receptor-0:1.6.2-1.el9ap,
Package States: OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Connectivity Link 1,Red Hat Connectivity Link 1,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,
Full Details
CVE document
CVE-2025-11579
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403068
Bugzilla Description:
github.com/nwaples/rardecode: RarDecode Out Of Memory Crash
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-789
Affected Packages:
Package States: OpenShift Serverless,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Trusted Application Pipeline,
Full Details
CVE document
CVE-2025-37727
Severity: moderate
Released on: 10/10/2025
Advisory:
Bugzilla: 2403034
Bugzilla Description:
org.elasticsearch/elasticsearch-core: Elasticsearch Insertion of sensitive information in log file
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-532
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document
CVE-2025-25017
Severity: important
Released on: 10/10/2025
Advisory:
Bugzilla: 2403040
Bugzilla Description:
Kibana: Kibana Stored Cross-Site Scripting (XSS)
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-79
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat OpenShift distributed tracing 3,Red Hat OpenStack Platform 16.2,
Full Details
CVE document
CVE-2025-25018
Severity: important
Released on: 10/10/2025
Advisory:
Bugzilla: 2403039
Bugzilla Description:
Kibana: Kibana Stored Cross-Site Scripting (XSS)
CVSS Score:
CVSSv3 Score: 8.7
Vector:
CWE: CWE-79
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat JBoss Enterprise Application Platform 8,Red Hat OpenShift distributed tracing 3,Red Hat OpenStack Platform 16.2,
Full Details
CVE document
CVE-2025-61783
Severity: moderate
Released on: 09/10/2025
Advisory:
Bugzilla: 2402951
Bugzilla Description:
social-app-django: Python Social Auth - Django has unsafe account association
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-303
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-61779
Severity: important
Released on: 09/10/2025
Advisory:
Bugzilla: 2402931
Bugzilla Description:
trustee: Trustee's attestation-policy endpoint missing autentication
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-639
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39963
Severity:
Released on: 09/10/2025
Advisory:
Bugzilla: 2402718
Bugzilla Description:
io_uring: fix incorrect io_kiocb reference in io_link_skb
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-39954
Severity:
Released on: 09/10/2025
Advisory:
Bugzilla: 2402697
Bugzilla Description:
kernel: clk: sunxi-ng: mp: Fix dual-divider clock rate readback
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39958
Severity: low
Released on: 09/10/2025
Advisory:
Bugzilla: 2402698
Bugzilla Description:
kernel: iommu/s390: Make attach succeed when the device was surprise removed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39955
Severity: moderate
Released on: 09/10/2025
Advisory: RHSA-2025:21931, RHSA-2025:22387, RHSA-2025:22388, RHSA-2025:22392,
Bugzilla: 2402699
Bugzilla Description:
kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-213
Affected Packages: kernel-0:6.12.0-124.13.1.el10_1,kernel-0:5.14.0-570.69.1.el9_6,kernel-rt-0:4.18.0-553.87.1.rt7.428.el8_10,kernel-0:4.18.0-553.87.1.el8_10,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39957
Severity: low
Released on: 09/10/2025
Advisory:
Bugzilla: 2402700
Bugzilla Description:
kernel: wifi: mac80211: increase scan_ies_len for S1G
CVSS Score:
CVSSv3 Score: 4.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39956
Severity: low
Released on: 09/10/2025
Advisory:
Bugzilla: 2402701
Bugzilla Description:
kernel: igc: don't fail igc_probe() on LED setup error
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-431
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39959
Severity: low
Released on: 09/10/2025
Advisory:
Bugzilla: 2402702
Bugzilla Description:
kernel: ASoC: amd: acp: Fix incorrect retrival of acp_chip_info
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39962
Severity:
Released on: 09/10/2025
Advisory:
Bugzilla: 2402721
Bugzilla Description:
kernel: rxrpc: Fix untrusted unsigned subtract
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39960
Severity:
Released on: 09/10/2025
Advisory:
Bugzilla: 2402722
Bugzilla Description:
kernel: gpiolib: acpi: initialize acpi_gpio_info struct
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39961
Severity: moderate
Released on: 09/10/2025
Advisory:
Bugzilla: 2402723
Bugzilla Description:
kernel: iommu/amd/pgtbl: Fix possible race while increase page table level
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11561
Severity: important
Released on: 09/10/2025
Advisory: RHSA-2025:19847, RHSA-2025:19859, RHSA-2025:19848, RHSA-2025:21020, RHSA-2025:19849, RHSA-2025:19850, RHSA-2025:19851, RHSA-2025:19854, RHSA-2025:21067, RHSA-2025:19610, RHSA-2025:19852, RHSA-2025:19853, RHSA-2025:21795, RHSA-2025:20954, RHSA-2025:21329,
Bugzilla: 2402727
Bugzilla Description:
sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-269
Affected Packages: sssd-0:2.11.1-2.el10_1.1,sssd-0:2.6.2-4.el9_0.4,sssd-0:2.10.2-3.el10_0.3,sssd-0:1.16.5-10.el7_9.17,sssd-0:2.8.2-5.el9_2.6,rhcos-418.94.202511170715-0,sssd-0:2.2.3-20.el8_2.3,sssd-0:2.4.0-9.el8_4.4,sssd-0:2.8.2-4.el8_8.3,sssd-0:2.9.6-4.el9_6.3,sssd-0:2.9.4-6.el9_4.4,rhcos-414.92.202511122212-0,sssd-0:2.6.2-4.el8_6.4,sssd-0:2.9.4-5.el8_10.3,sssd-0:2.9.7-4.el9_7.1,
Package States: Red Hat Enterprise Linux 6,
Full Details
CVE document
CVE-2025-11495
Severity: low
Released on: 08/10/2025
Advisory:
Bugzilla: 2402584
Bugzilla Description:
binutils: GNU Binutils Linker heap-based overflow
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11494
Severity: low
Released on: 08/10/2025
Advisory:
Bugzilla: 2402559
Bugzilla Description:
binutils: GNU Binutils Linker out-of-bounds read
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-119|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61620
Severity: moderate
Released on: 08/10/2025
Advisory:
Bugzilla: 2401761
Bugzilla Description:
vllm: vLLM OpenAI-Compatible Server Resource Exhaustion via chat_template Parameters
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document
CVE-2025-11414
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402424
Bugzilla Description:
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-119|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11413
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402423
Bugzilla Description:
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: (CWE-119|CWE-787)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11412
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402425
Bugzilla Description:
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-119|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-8291
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402342
Bugzilla Description:
cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-130
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2023-53651
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402267
Bugzilla Description:
Input: exc3000 - properly stop timer on shutdown
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2023-53621
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402239
Bugzilla Description:
memcontrol: ensure memcg acquired by id is properly set up
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2022-50522
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402280
Bugzilla Description:
mcb: mcb-parse: fix error handing in chameleon_parse_gdd()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-61772
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2025:20962, RHSA-2025:19513, RHSA-2025:19733, RHSA-2025:19734, RHSA-2025:19800, RHSA-2025:21036, RHSA-2025:19512, RHSA-2025:19647, RHSA-2025:19736, RHSA-2025:19719, RHSA-2025:19948,
Bugzilla: 2402200
Bugzilla Description:
rack: Rack memory exhaustion denial of service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-400
Affected Packages: pcs-0:0.11.10-1.el9_7.1,pcs-0:0.10.18-2.el8_10.7,pcs-0:0.10.12-6.el8_6.10,pcs-0:0.11.4-7.el9_2.6,pcs-0:0.12.0-3.el10_0.3,pcs-0:0.10.15-4.el8_8.9,pcs-0:0.12.1-1.el10_1.1,pcs-0:0.11.9-2.el9_6.2,pcs-0:0.10.8-1.el8_4.8,pcs-0:0.11.7-2.el9_4.5,pcs-0:0.11.1-10.el9_0.9,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),
Full Details
CVE document
CVE-2025-61771
Severity: important
Released on: 07/10/2025
Advisory: RHSA-2025:20962, RHSA-2025:19513, RHSA-2025:19734, RHSA-2025:19800, RHSA-2025:21036, RHSA-2025:21696, RHSA-2025:19512, RHSA-2025:19647, RHSA-2025:19719, RHSA-2025:19948,
Bugzilla: 2402175
Bugzilla Description:
rack: Rack's multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1284
Affected Packages: pcs-0:0.11.10-1.el9_7.1,pcs-0:0.10.18-2.el8_10.7,pcs-0:0.10.12-6.el8_6.10,pcs-0:0.9.169-3.el7_9.5,pcs-0:0.12.0-3.el10_0.3,pcs-0:0.10.15-4.el8_8.9,pcs-0:0.12.1-1.el10_1.1,pcs-0:0.11.9-2.el9_6.2,pcs-0:0.10.8-1.el8_4.8,pcs-0:0.11.1-10.el9_0.9,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),
Full Details
CVE document
CVE-2025-61770
Severity: important
Released on: 07/10/2025
Advisory: RHSA-2025:20962, RHSA-2025:19513, RHSA-2025:19733, RHSA-2025:19734, RHSA-2025:19800, RHSA-2025:21036, RHSA-2025:21696, RHSA-2025:19512, RHSA-2025:19647, RHSA-2025:19736, RHSA-2025:19719, RHSA-2025:19948,
Bugzilla: 2402174
Bugzilla Description:
rack: Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages: pcs-0:0.11.10-1.el9_7.1,pcs-0:0.10.18-2.el8_10.7,pcs-0:0.10.12-6.el8_6.10,pcs-0:0.11.4-7.el9_2.6,pcs-0:0.9.169-3.el7_9.5,pcs-0:0.12.0-3.el10_0.3,pcs-0:0.10.15-4.el8_8.9,pcs-0:0.12.1-1.el10_1.1,pcs-0:0.11.9-2.el9_6.2,pcs-0:0.10.8-1.el8_4.8,pcs-0:0.11.7-2.el9_4.5,pcs-0:0.11.1-10.el9_0.9,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),
Full Details
CVE document
CVE-2025-58712
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2025:17562,
Bugzilla: 2394418
Bugzilla Description:
amq: privilege escalation via excessive /etc/passwd permissions
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-276
Affected Packages: amq7/amq-broker-rhel9-operator:7.13.2-1,amq7-tech-preview/amq-broker-jolokia-api-server-rhel9:7.13.2-1,amq7/amq-broker-rhel9-operator-bundle:7.13.2-1,amq7-tech-preview/amq-broker-console-plugin-rhel9:7.13.2-1,amq7/amq-broker-rhel9:7.13.2-1,amq7/amq-broker-init-rhel9:7.13.2-1,
Package States: Red Hat AMQ Broker 7,Red Hat AMQ Broker 7,Red Hat AMQ Broker 7,Red Hat AMQ Broker 7,
Full Details
CVE document
CVE-2025-25009
Severity: important
Released on: 07/10/2025
Advisory:
Bugzilla: 2402177
Bugzilla Description:
kibana: Kibana Cross-Site Scripting (XSS)
CVSS Score:
CVSSv3 Score: 8.7
Vector:
CWE: CWE-79
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document
CVE-2025-37728
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402166
Bugzilla Description:
kibana: Kibana Insufficiently Protected Credentials in the CrowdStrike Connector
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-522
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document
CVE-2025-13033
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402179
Bugzilla Description:
nodemailer: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: (CWE-20|CWE-436)
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ceph Storage 8,Red Hat Developer Hub,
Full Details
CVE document
CVE-2025-6242
Severity: important
Released on: 07/10/2025
Advisory:
Bugzilla: 2373716
Bugzilla Description:
vllm: Server Side request forgery (SSRF) in MediaConnector
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-918
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-59425
Severity: important
Released on: 07/10/2025
Advisory:
Bugzilla: 2397234
Bugzilla Description:
vllm: Timing Attack in vLLM API Token Verification Leading to Authentication Bypass
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-208
Affected Packages:
Package States: Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-11419
Severity: important
Released on: 07/10/2025
Advisory: RHSA-2025:18254, RHSA-2025:18255, RHSA-2025:18889, RHSA-2025:18890,
Bugzilla: 2402142
Bugzilla Description:
keycloak: Keycloak TLS Client-Initiated Renegotiation Denial of Service
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: rhbk/keycloak-rhel9:26.0-20,rhbk/keycloak-operator-bundle:26.2.10-2,rhbk/keycloak-rhel9-operator:26.2-11,rhbk/keycloak-rhel9-operator:26.0-21,rhbk/keycloak-operator-bundle:26.0.16-2,keycloak-server,rhbk/keycloak-rhel9:26.2-11,
Package States:
Full Details
CVE document
CVE-2025-11429
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2025:22089, RHSA-2025:22088,
Bugzilla: 2402148
Bugzilla Description:
keycloak-server: Too long and not settings compliant session
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-613
Affected Packages: rhbk/keycloak-operator-bundle:26.2.11-1,rhbk/keycloak-rhel9-operator:26.2-12,rhbk/keycloak-rhel9:26.2-12,
Package States:
Full Details
CVE document
CVE-2023-53659
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402183
Bugzilla Description:
kernel: iavf: Fix out-of-bounds when setting channels on remove
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53643
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402186
Bugzilla Description:
kernel: nvme-tcp: don't access released socket during error recovery
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-825
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53622
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402187
Bugzilla Description:
kernel: gfs2: Fix possible data races in gfs2_show_options()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53641
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402188
Bugzilla Description:
kernel: wifi: ath9k: hif_usb: fix memory leak of remain_skbs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53654
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2025:6966,
Bugzilla: 2402189
Bugzilla Description:
kernel: octeontx2-af: Add validation before accessing cgx and lmac
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-131
Affected Packages: kernel-0:5.14.0-570.12.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53662
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2402190
Bugzilla Description:
kernel: ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup}
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53676
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402191
Bugzilla Description:
kernel: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50542
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402192
Bugzilla Description:
kernel: media: si470x: Fix use-after-free in si470x_int_in_callback()
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53673
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402193
Bugzilla Description:
kernel: Bluetooth: hci_event: call disconnect callback before deleting conn
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50526
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402194
Bugzilla Description:
kernel: drm/msm/dp: fix memory corruption with too many bridges
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50528
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402195
Bugzilla Description:
kernel: drm/amdkfd: Fix memory leakage
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53656
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402196
Bugzilla Description:
kernel: drivers/perf: hisi: Don't migrate perf to the CPU going to teardown
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-367
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50521
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402197
Bugzilla Description:
kernel: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53638
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402198
Bugzilla Description:
kernel: octeon_ep: cancel queued works in probe error path
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53642
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402199
Bugzilla Description:
kernel: x86: fix clear_user_rep_good() exception handling annotation
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53681
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402201
Bugzilla Description:
kernel: bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53617
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402202
Bugzilla Description:
kernel: soc: aspeed: socinfo: Add kfree for kstrdup
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53677
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394, RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402203
Bugzilla Description:
kernel: drm/i915: Fix memory leaks in i915 selftests
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50540
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402204
Bugzilla Description:
kernel: dmaengine: qcom-adm: fix wrong sizeof config in slave_config
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1025
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53664
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402206
Bugzilla Description:
kernel: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53627
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402208
Bugzilla Description:
kernel: scsi: hisi_sas: Grab sas_dev lock when traversing the members of sas_dev.list
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-820
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53663
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402209
Bugzilla Description:
kernel: KVM: nSVM: Check instead of asserting on nested TSC scaling support
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-617
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50513
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402210
Bugzilla Description:
kernel: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53625
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402211
Bugzilla Description:
kernel: drm/i915/gvt: fix vgpu debugfs clean in remove
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50548
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402212
Bugzilla Description:
kernel: media: i2c: hi846: Fix memory leak in hi846_parse_dt()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53680
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402213
Bugzilla Description:
kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53649
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2022:1988, RHSA-2024:2394,
Bugzilla: 2402214
Bugzilla Description:
kernel: perf trace: Really free the evsel->priv area
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-771
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-372.9.1.el8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53679
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402215
Bugzilla Description:
kernel: wifi: mt7601u: fix an integer underflow
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53665
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402216
Bugzilla Description:
kernel: md: don't dereference mddev after export_rdev()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-911
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53678
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402217
Bugzilla Description:
kernel: drm/i915: Fix system suspend without fbdev being initialized
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53655
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402218
Bugzilla Description:
kernel: rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-835
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50520
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402219
Bugzilla Description:
kernel: drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50517
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402220
Bugzilla Description:
kernel: mm/huge_memory: do not clobber swp_entry_t during THP split
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-826
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50537
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402221
Bugzilla Description:
kernel: firmware: raspberrypi: fix possible memory leak in rpi_firmware_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50543
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:6583,
Bugzilla: 2402222
Bugzilla Description:
kernel: RDMA/rxe: Fix mr->map double free
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-1341
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53658
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402223
Bugzilla Description:
kernel: spi: bcm-qspi: return error if neither hif_mspi nor mspi is available
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53669
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402224
Bugzilla Description:
kernel: tcp: fix skb_copy_ubufs() vs BIG TCP
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-131
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53650
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402225
Bugzilla Description:
kernel: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50529
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402226
Bugzilla Description:
kernel: test_firmware: fix memory leak in test_firmware_init()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50555
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:2458, RHSA-2023:7077,
Bugzilla: 2402227
Bugzilla Description:
kernel: tipc: fix a null-ptr-deref in tipc_topsrv_accept
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,kernel-0:4.18.0-513.5.1.el8_9,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50519
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402228
Bugzilla Description:
kernel: nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50512
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:2458,
Bugzilla: 2402229
Bugzilla Description:
kernel: ext4: fix potential memory leak in ext4_fc_record_regions()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53633
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402230
Bugzilla Description:
kernel: accel/qaic: Fix a leak in map_user_pages()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53672
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402231
Bugzilla Description:
kernel: btrfs: output extra debug info if we failed to find an inline backref
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-253
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53668
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402232
Bugzilla Description:
kernel: ring-buffer: Fix deadloop issue on reading trace_pipe
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53653
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402233
Bugzilla Description:
kernel: media: amphion: fix REVERSE_INULL issues reported by coverity
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53646
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394, RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402234
Bugzilla Description:
kernel: drm/i915/perf: add sentinel to xehp_oa_b_counters
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-125
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53647
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402235
Bugzilla Description:
kernel: Drivers: hv: vmbus: Don't dereference ACPI root object handle
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50533
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402236
Bugzilla Description:
kernel: wifi: mac80211: mlme: fix null-ptr deref on failed assoc
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50538
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402237
Bugzilla Description:
kernel: vme: Fix error not catched in fake_init()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53660
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:2394, RHSA-2022:8267,
Bugzilla: 2402238
Bugzilla Description:
kernel: bpf, cpumap: Handle skb as well when clean up ptr_ring
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-843
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:5.14.0-162.6.1.el9_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50546
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:2458, RHSA-2024:3138,
Bugzilla: 2402240
Bugzilla Description:
kernel: ext4: fix uninititialized value in 'ext4_evict_inode'
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50539
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402241
Bugzilla Description:
kernel: ARM: OMAP2+: omap4-common: Fix refcount leak bug
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53628
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402243
Bugzilla Description:
kernel: drm/amdgpu: drop gfx_v11_0_cp_ecc_error_irq_funcs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50550
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402244
Bugzilla Description:
kernel: blk-iolatency: Fix memory leak on add_disk() failures
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53661
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2402245
Bugzilla Description:
kernel: bnxt: avoid overflow in bnxt_get_nvram_directory()
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-190
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53631
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402246
Bugzilla Description:
kernel: platform/x86: dell-sysman: Fix reference leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50523
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402247
Bugzilla Description:
kernel: clk: rockchip: Fix memory leak in rockchip_clk_register_pll()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-771
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53639
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402248
Bugzilla Description:
kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50527
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402249
Bugzilla Description:
kernel: drm/amdgpu: Fix size validation for non-exclusive domains (v4)
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50514
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402250
Bugzilla Description:
kernel: usb: gadget: f_hid: fix refcount leak on error path
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50549
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2402251
Bugzilla Description:
kernel: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53636
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402252
Bugzilla Description:
kernel: clk: microchip: fix potential UAF in auxdev release callback
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53626
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402253
Bugzilla Description:
kernel: ext4: fix possible double unlock when moving a directory
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-459
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53632
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402254
Bugzilla Description:
kernel: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53667
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402255
Bugzilla Description:
kernel: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50509
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402256
Bugzilla Description:
kernel: media: coda: Add check for kmalloc
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50536
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2022:1988, RHSA-2023:6583, RHSA-2022:8267,
Bugzilla: 2402257
Bugzilla Description:
kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-372.9.1.el8,kernel-0:5.14.0-162.6.1.el9_1,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53640
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402258
Bugzilla Description:
kernel: ASoC: lpass: Fix for KASAN use_after_free out of bounds
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-787
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53644
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402259
Bugzilla Description:
kernel: media: radio-shark: Add endpoint checks
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50541
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2402260
Bugzilla Description:
kernel: dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53671
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402261
Bugzilla Description:
kernel: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53686
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402262
Bugzilla Description:
kernel: net/handshake: fix null-ptr-deref in handshake_nl_done_doit()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53674
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2402263
Bugzilla Description:
kernel: clk: Fix memory leak in devm_clk_notifier_register()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53685
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402264
Bugzilla Description:
kernel: tun: Fix memory leak for detached NAPI queue
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53670
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402265
Bugzilla Description:
kernel: nvme-core: fix dev_pm_qos memleak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50552
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402266
Bugzilla Description:
kernel: blk-mq: use quiesced elevator switch when reinitializing queues
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53620
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7539, RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402268
Bugzilla Description:
kernel: md: fix soft lockup in status_resync
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,kernel-0:4.18.0-477.36.1.el8_8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50544
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402269
Bugzilla Description:
kernel: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53634
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:2458, RHSA-2023:6583,
Bugzilla: 2402271
Bugzilla Description:
kernel: bpf, arm64: Fixed a BTI error on returning to patched function
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53684
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402272
Bugzilla Description:
kernel: xfrm: Zero padding when dumping algos and encap
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50524
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402273
Bugzilla Description:
kernel: iommu/mediatek: Check return value after calling platform_get_resource()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50531
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402274
Bugzilla Description:
kernel: tipc: fix an information leak in tipc_topsrv_kern_subscr
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53637
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402275
Bugzilla Description:
kernel: media: i2c: ov772x: Fix memleak in ov772x_probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50525
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402276
Bugzilla Description:
kernel: iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50547
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402277
Bugzilla Description:
kernel: media: solo6x10: fix possible memory leak in solo_sysfs_init()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53630
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402278
Bugzilla Description:
kernel: iommufd: Fix unpinning of pages when an access is present
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53652
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402279
Bugzilla Description:
kernel: vdpa: Add features attr to vdpa_nl_policy for nlattr length check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-125
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53657
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7749, RHSA-2024:2394, RHSA-2023:7557, RHSA-2024:3138,
Bugzilla: 2402281
Bugzilla Description:
kernel: ice: Don't tx before switchdev is fully configured
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-367
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-305.114.1.el8_4,kernel-0:4.18.0-553.el8_10,kernel-0:5.14.0-362.13.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50534
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2402282
Bugzilla Description:
kernel: dm thin: Use last transaction's pmd->root when commit failed
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53618
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402283
Bugzilla Description:
kernel: btrfs: reject invalid reloc tree root keys with stack dump
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53645
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2402284
Bugzilla Description:
kernel: bpf: Make bpf_refcount_acquire fallible for non-owning refs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53635
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2402285
Bugzilla Description:
kernel: netfilter: conntrack: fix wrong ct->timeout value
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-682
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50553
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402286
Bugzilla Description:
kernel: tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx'
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53648
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:3138,
Bugzilla: 2402287
Bugzilla Description:
kernel: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53687
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2402288
Bugzilla Description:
kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53623
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2024:3138, RHSA-2023:6583,
Bugzilla: 2402289
Bugzilla Description:
kernel: mm/swap: fix swap_info_struct race between swapoff and get_swap_pages()
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-413
Affected Packages: kernel-0:4.18.0-553.el8_10,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50545
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402290
Bugzilla Description:
kernel: r6040: Fix kmemleak in probe and remove
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50530
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:2458,
Bugzilla: 2402291
Bugzilla Description:
kernel: blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50515
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402292
Bugzilla Description:
kernel: drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53675
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402293
Bugzilla Description:
kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50518
Severity:
Released on: 07/10/2025
Advisory:
Bugzilla: 2402294
Bugzilla Description:
kernel: parisc: Fix locking in pdc_iodc_print() firmware call
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50511
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2025:6966,
Bugzilla: 2402295
Bugzilla Description:
kernel: lib/fonts: fix undefined behavior in bit shift for get_default_font
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-1335
Affected Packages: kernel-0:5.14.0-570.12.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53624
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402296
Bugzilla Description:
kernel: net/sched: sch_fq: fix integer overflow of "credit"
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53619
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402297
Bugzilla Description:
kernel: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50532
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402298
Bugzilla Description:
kernel: scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53666
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402299
Bugzilla Description:
kernel: ASoC: codecs: wcd938x: fix missing mbhc init error handling
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50510
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2022:1988, RHSA-2023:6583,
Bugzilla: 2402300
Bugzilla Description:
kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-372.9.1.el8,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53683
Severity: low
Released on: 07/10/2025
Advisory:
Bugzilla: 2402301
Bugzilla Description:
kernel: fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53682
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402302
Bugzilla Description:
kernel: hwmon: (xgene) Fix ioremap and memremap leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50551
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402304
Bugzilla Description:
kernel: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request()
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-682
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53629
Severity: moderate
Released on: 07/10/2025
Advisory:
Bugzilla: 2402305
Bugzilla Description:
kernel: fs: dlm: fix use after free in midcomms commit
CVSS Score:
CVSSv3 Score: 4.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50554
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2402306
Bugzilla Description:
kernel: blk-mq: avoid double ->queue_rq() because of early timeout
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-820
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50516
Severity: moderate
Released on: 07/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2402307
Bugzilla Description:
kernel: fs: dlm: fix invalid derefence of sb_lvbptr
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50535
Severity: low
Released on: 07/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2402308
Bugzilla Description:
kernel: drm/amd/display: Fix potential null-deref in dm_resume
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-6985
Severity: important
Released on: 06/10/2025
Advisory: RHSA-2025:18984,
Bugzilla: 2401958
Bugzilla Description:
langchain-text-splitters: XXE Vulnerability in langchain-text-splitters
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-611
Affected Packages: ansible-automation-platform-25/lightspeed-rhel8:2.5.250924-2,
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document
CVE-2025-59734
Severity: important
Released on: 06/10/2025
Advisory:
Bugzilla: 2401800
Bugzilla Description:
FFmpeg: FFmpeg: Use-after-free vulnerability in SANM decoding
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-416
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-59733
Severity: important
Released on: 06/10/2025
Advisory:
Bugzilla: 2401799
Bugzilla Description:
FFmpeg: FFmpeg: Buffer overflow in OpenEXR DWAA/DWAB decoding
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-59732
Severity: important
Released on: 06/10/2025
Advisory:
Bugzilla: 2401797
Bugzilla Description:
FFmpeg: FFmpeg: Heap memory corruption when decoding OpenEXR files with DWAA/DWAB compression
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-59730
Severity: moderate
Released on: 06/10/2025
Advisory:
Bugzilla: 2401802
Bugzilla Description:
FFmpeg: FFmpeg: Heap-buffer-overflow in SANM (ANIM v0 variant) file frame decoding
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-59729
Severity: moderate
Released on: 06/10/2025
Advisory:
Bugzilla: 2401798
Bugzilla Description:
FFmpeg: FFmpeg: Integer underflow in DHAV file header parsing leads to out-of-bounds read
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-59728
Severity: important
Released on: 06/10/2025
Advisory:
Bugzilla: 2401803
Bugzilla Description:
FFmpeg: FFmpeg: Out-of-bounds NUL-byte write in MPEG-DASH manifest handling
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-787
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-61984
Severity: moderate
Released on: 06/10/2025
Advisory:
Bugzilla: 2401960
Bugzilla Description:
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-159
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-61985
Severity: moderate
Released on: 06/10/2025
Advisory:
Bugzilla: 2401962
Bugzilla Description:
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-158
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-11277
Severity: moderate
Released on: 05/10/2025
Advisory: RHSA-2025:20963, RHSA-2025:22361, RHSA-2025:19911,
Bugzilla: 2401622
Bugzilla Description:
assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: (CWE-122|CWE-787)
Affected Packages: qt5-qt3d-0:5.15.9-2.el9_7.1,qt6-qtquick3d-0:6.9.1-1.el10_1.1,qt5-qt3d-0:5.15.9-2.el9_6.1,
Package States:
Full Details
CVE document
CVE-2025-11275
Severity: moderate
Released on: 05/10/2025
Advisory:
Bugzilla: 2401616
Bugzilla Description:
assimp: Open Asset Import Library Assimp OpenDDLParserUtils.h getNextSeparator heap-based overflow
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: (CWE-122|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11274
Severity: moderate
Released on: 05/10/2025
Advisory:
Bugzilla: 2401615
Bugzilla Description:
assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile allocation of resources
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-20->CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39942
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401421
Bugzilla Description:
ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-61962
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401405
Bugzilla Description:
fetchmail: Fetchmail denial of service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-142
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39935
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401409
Bugzilla Description:
kernel: ASoC: codec: sma1307: Fix memory corruption in sma1307_setting_loaded()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39951
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401410
Bugzilla Description:
kernel: um: virtio_uml: Fix use-after-free after put_device in probe
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39938
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401411
Bugzilla Description:
kernel: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39945
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401412
Bugzilla Description:
kernel: cnic: Fix use-after-free bugs in cnic_delete_task
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39953
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401413
Bugzilla Description:
kernel: cgroup: split cgroup_destroy_wq into 3 workqueues
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39946
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2025:21463,
Bugzilla: 2401414
Bugzilla Description:
kernel: tls: make sure to abort the stream if headers are bogus
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-787
Affected Packages: kernel-0:6.12.0-124.11.1.el10_1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39948
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401415
Bugzilla Description:
kernel: ice: fix Rx page leak on multi-buffer frames
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39939
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401416
Bugzilla Description:
kernel: iommu/s390: Fix memory corruption when using identity domain
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39932
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401417
Bugzilla Description:
kernel: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39937
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401418
Bugzilla Description:
kernel: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39929
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401419
Bugzilla Description:
kernel: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39940
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401420
Bugzilla Description:
kernel: dm-stripe: fix a possible integer overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39949
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401422
Bugzilla Description:
kernel: qed: Don't collect too many protection override GRC elements
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39931
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401423
Bugzilla Description:
kernel: crypto: af_alg - Set merge to zero early in af_alg_sendmsg
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-457
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39943
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401424
Bugzilla Description:
kernel: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39941
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401425
Bugzilla Description:
kernel: zram: fix slot write race condition
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39936
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401426
Bugzilla Description:
kernel: crypto: ccp - Always pass in an error pointer to __sev_platform_shutdown_locked()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39934
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401428
Bugzilla Description:
kernel: drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39952
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401429
Bugzilla Description:
kernel: wifi: wilc1000: avoid buffer overflow in WID string configuration
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39944
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401430
Bugzilla Description:
kernel: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39947
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401431
Bugzilla Description:
kernel: net/mlx5e: Harden uplink netdev access against device unbind
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39933
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401432
Bugzilla Description:
kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50499
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401454
Bugzilla Description:
kernel: media: dvb-core: Fix double free in dvb_register_device()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50472
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401455
Bugzilla Description:
kernel: IB/mad: Don't call to function that might sleep while in atomic context
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-474
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50504
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401456
Bugzilla Description:
kernel: powerpc/rtas: avoid scheduling in rtas_os_term()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53608
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401457
Bugzilla Description:
kernel: nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53603
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401458
Bugzilla Description:
kernel: scsi: qla2xxx: Avoid fcport pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53591
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401459
Bugzilla Description:
kernel: net/mlx5e: Fix deadlock in tc route query code
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53602
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401460
Bugzilla Description:
kernel: wifi: ath11k: fix memory leak in WMI firmware stats
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53571
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401461
Bugzilla Description:
kernel: drm/i915: Make intel_get_crtc_new_encoder() less oopsy
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53604
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401462
Bugzilla Description:
kernel: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53550
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401463
Bugzilla Description:
kernel: cpufreq: amd-pstate: fix global sysfs attribute type
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50483
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401464
Bugzilla Description:
kernel: net: enetc: avoid buffer leaks on xdp_do_redirect() failure
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53555
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2025:6966,
Bugzilla: 2401465
Bugzilla Description:
kernel: mm/damon/core: initialize damo_filter->list from damos_new_filter()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-824
Affected Packages: kernel-0:5.14.0-570.12.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53597
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401466
Bugzilla Description:
kernel: cifs: fix mid leak during reconnection after timeout threshold
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50480
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401467
Bugzilla Description:
kernel: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53590
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401468
Bugzilla Description:
kernel: sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-1050
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53615
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401469
Bugzilla Description:
kernel: scsi: qla2xxx: Fix deletion race condition
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-413
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50477
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2401470
Bugzilla Description:
kernel: rtc: class: Fix potential memleak in devm_rtc_allocate_device()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53557
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401471
Bugzilla Description:
kernel: fprobe: Release rethook after the ftrace_ops is unregistered
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53610
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401472
Bugzilla Description:
kernel: irqchip: Fix refcount leak in platform_irqchip_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53562
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401473
Bugzilla Description:
kernel: drm/msm: fix vram leak on bind errors
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53544
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401474
Bugzilla Description:
kernel: cpufreq: davinci: Fix clk use after free
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-825
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53574
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401475
Bugzilla Description:
kernel: wifi: rtw88: delete timer and free skb queue when unloading
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-404
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53580
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401476
Bugzilla Description:
kernel: USB: Gadget: core: Help prevent panic during UVC unconfigure
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-764
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50486
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2401477
Bugzilla Description:
kernel: net: ethernet: ti: Fix return type of netcp_ndo_start_xmit()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-843
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50502
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401479
Bugzilla Description:
kernel: mm: /proc/pid/smaps_rollup: fix no vma's null-deref
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53587
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401480
Bugzilla Description:
kernel: ring-buffer: Sync IRQ works before buffer destruction
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53551
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401481
Bugzilla Description:
kernel: usb: gadget: u_serial: Add null pointer check in gserial_resume
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50491
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2025:6966,
Bugzilla: 2401482
Bugzilla Description:
kernel: coresight: cti: Fix hang in cti_disable_hw()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1322
Affected Packages: kernel-0:5.14.0-570.12.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50498
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401483
Bugzilla Description:
kernel: eth: alx: take rtnl_lock on resume
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-413
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53548
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401484
Bugzilla Description:
kernel: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53535
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401485
Bugzilla Description:
kernel: net: bcmgenet: Add a check for oversized packets
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50503
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401486
Bugzilla Description:
kernel: mtd: lpddr2_nvm: Fix possible null-ptr-deref
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53575
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401487
Bugzilla Description:
kernel: wifi: iwlwifi: mvm: fix potential array out of bounds access
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-125
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50484
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2401488
Bugzilla Description:
kernel: ALSA: usb-audio: Fix potential memory leaks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53559
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401489
Bugzilla Description:
kernel: ip_vti: fix potential slab-use-after-free in decode_session6
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-825
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53609
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2401490
Bugzilla Description:
kernel: scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-825
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53549
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:6583,
Bugzilla: 2401491
Bugzilla Description:
kernel: netfilter: ipset: Rework long task execution when adding/deleting entries
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1050
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53578
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583, RHSA-2021:4356,
Bugzilla: 2401492
Bugzilla Description:
kernel: net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-131
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,kernel-0:4.18.0-348.el8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50508
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401493
Bugzilla Description:
kernel: wifi: mt76: mt76x0: fix oob access in mt76x0_phy_get_target_power
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53594
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401494
Bugzilla Description:
kernel: driver core: fix resource leak in device_add()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-771
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53585
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2020:4431, RHSA-2024:2394,
Bugzilla: 2401495
Bugzilla Description:
kernel: bpf: reject unhashed sockets in bpf_sk_assign
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-240.el8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53567
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401496
Bugzilla Description:
kernel: spi: qup: Don't skip cleanup in remove's error path
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-771
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53601
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401497
Bugzilla Description:
kernel: bonding: do not assume skb mac_header is set
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-665
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50487
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458, RHSA-2023:0832,
Bugzilla: 2401498
Bugzilla Description:
kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-131
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,kernel-0:4.18.0-425.13.1.el8_7,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53533
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401499
Bugzilla Description:
kernel: Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53598
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583, RHSA-2021:4356,
Bugzilla: 2401500
Bugzilla Description:
kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-787
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,kernel-0:4.18.0-348.el8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53596
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2401501
Bugzilla Description:
kernel: drivers: base: Free devm resources when unregistering a device
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-771
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53612
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401502
Bugzilla Description:
kernel: hwmon: (coretemp) Simplify platform device handling
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53572
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2401503
Bugzilla Description:
kernel: clk: imx: scu: use _safe list iterator to avoid a use after free
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-825
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53565
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401504
Bugzilla Description:
kernel: wifi: brcmfmac: Check for probe() id argument being NULL
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53583
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401505
Bugzilla Description:
kernel: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53561
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2401506
Bugzilla Description:
kernel: net: wwan: iosm: fix NULL pointer dereference when removing device
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53568
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2025:6966,
Bugzilla: 2401507
Bugzilla Description:
kernel: s390/zcrypt: don't leak memory if dev_set_name() fails
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-570.12.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50478
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401508
Bugzilla Description:
kernel: nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53595
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2025:6966,
Bugzilla: 2401509
Bugzilla Description:
kernel: octeontx2-pf: mcs: Fix NULL pointer dereferences
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-570.12.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53539
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401510
Bugzilla Description:
kernel: RDMA/rxe: Fix incomplete state save in rxe_requester
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53547
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401511
Bugzilla Description:
kernel: drm/amdgpu: Fix sdma v4 sw fini error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1341
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50495
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:5928, RHSA-2024:9315, RHSA-2024:5101, RHSA-2024:6992,
Bugzilla: 2401512
Bugzilla Description:
kernel: x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-553.16.1.el8_10,kernel-0:4.18.0-193.141.1.el8_2,kernel-0:5.14.0-503.11.1.el9_5,kernel-0:5.14.0-427.33.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50507
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401513
Bugzilla Description:
kernel: fs/ntfs3: Validate data run offset
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53552
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458, RHSA-2024:2394,
Bugzilla: 2401514
Bugzilla Description:
kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-825
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-427.13.1.el9_4,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53573
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401515
Bugzilla Description:
kernel: clk: rs9: Fix suspend/resume
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50493
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401516
Bugzilla Description:
kernel: scsi: qla2xxx: Fix crash when I/O abort times out
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53607
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583, RHSA-2021:4356,
Bugzilla: 2401517
Bugzilla Description:
kernel: ALSA: ymfpci: Fix BUG_ON in probe function
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-131
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,kernel-0:4.18.0-348.el8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53613
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2401518
Bugzilla Description:
kernel: dax: Fix dax_mapping_release() use after free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1341
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53541
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401519
Bugzilla Description:
kernel: mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53554
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401520
Bugzilla Description:
kernel: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53569
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401521
Bugzilla Description:
kernel: ext2: Check block size validity during mount
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50505
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2401522
Bugzilla Description:
kernel: iommu/amd: Fix pci device refcount leak in ppr_notifier()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53592
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401523
Bugzilla Description:
kernel: gpio: sifive: Fix refcount leak in sifive_gpio_probe
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53576
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:3138, RHSA-2023:6583,
Bugzilla: 2401524
Bugzilla Description:
kernel: null_blk: Always check queue mode setting from configfs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1288
Affected Packages: kernel-0:4.18.0-553.el8_10,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53600
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401525
Bugzilla Description:
kernel: tunnels: fix kasan splat when generating ipv4 pmtu error
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50500
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401526
Bugzilla Description:
kernel: netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50476
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401527
Bugzilla Description:
kernel: ntb_netdev: Use dev_kfree_skb_any() in interrupt context
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-763
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53538
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401528
Bugzilla Description:
kernel: btrfs: insert tree mod log move in push_node_left
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50475
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2022:1988, RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401529
Bugzilla Description:
kernel: RDMA/core: Make sure "ib_port" is valid when access sysfs node
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-825
Affected Packages: kernel-0:4.18.0-372.9.1.el8,kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50473
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2020:1769, RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401530
Bugzilla Description:
kernel: cpufreq: Init completion before kobject_init_and_add()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-909
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:4.18.0-193.el8,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50485
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401531
Bugzilla Description:
kernel: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-654
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53536
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401532
Bugzilla Description:
kernel: blk-crypto: make blk_crypto_evict_key() more robust
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-825
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50474
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401533
Bugzilla Description:
kernel: macintosh: fix possible memory leak in macio_add_one_device()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50496
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:2458,
Bugzilla: 2401534
Bugzilla Description:
kernel: dm cache: Fix UAF in destroy()
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-825
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53540
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401535
Bugzilla Description:
kernel: wifi: cfg80211: reject auth/assoc to AP with our address
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53593
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401536
Bugzilla Description:
kernel: cifs: Release folio lock on fscache read hit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50479
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401537
Bugzilla Description:
kernel: drm/amd: fix potential memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53588
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401538
Bugzilla Description:
kernel: wifi: mac80211: check for station first in client probe
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-754
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53545
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:2394,
Bugzilla: 2401539
Bugzilla Description:
kernel: drm/amdgpu: unmap and remove csa_va properly
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-366
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50497
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401540
Bugzilla Description:
kernel: binfmt_misc: fix shift-out-of-bounds in check_special_flags
CVSS Score:
CVSSv3 Score: 2.3
Vector:
CWE: CWE-681
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53586
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401541
Bugzilla Description:
kernel: scsi: target: Fix multiple LUN_RESET handling
CVSS Score:
CVSSv3 Score: 5.1
Vector:
CWE: CWE-821
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53564
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401542
Bugzilla Description:
kernel: ocfs2: fix defrag path triggering jbd2 ASSERT
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53558
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2025:11810, RHSA-2024:9315,
Bugzilla: 2401543
Bugzilla Description:
kernel: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-1322
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,kernel-0:5.14.0-427.79.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53616
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401544
Bugzilla Description:
kernel: jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-1341
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53581
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138, RHSA-2020:1769,
Bugzilla: 2401545
Bugzilla Description:
kernel: net/mlx5e: Check for NOT_READY flag state after locking
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-193.el8,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53542
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401546
Bugzilla Description:
kernel: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-843
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53579
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401547
Bugzilla Description:
kernel: gpio: mvebu: fix irq domain leak
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53606
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:2458,
Bugzilla: 2401548
Bugzilla Description:
kernel: nfsd: clean up potential nfsd_file refcount leaks in COPY codepath
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50489
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401549
Bugzilla Description:
kernel: drm/mipi-dsi: Detach devices when removing the host
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-459
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53566
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:3421, RHSA-2023:6583,
Bugzilla: 2401550
Bugzilla Description:
kernel: netfilter: nft_set_rbtree: fix null deref on element insertion
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: (CWE-476|CWE-416)
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,kernel-0:5.14.0-70.101.1.el9_0,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50488
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2401551
Bugzilla Description:
kernel: block, bfq: fix possible uaf for 'bfqq->bic'
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-826
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53553
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401552
Bugzilla Description:
kernel: HID: hyperv: avoid struct memcpy overrun warning
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-787
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53605
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401553
Bugzilla Description:
kernel: drm: amd: display: Fix memory leakage
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-771
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50490
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401554
Bugzilla Description:
kernel: bpf: Propagate error from htab_lock_bucket() to userspace
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53543
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401555
Bugzilla Description:
kernel: vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50492
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401556
Bugzilla Description:
kernel: drm/msm: fix use-after-free on probe deferral
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53611
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401557
Bugzilla Description:
kernel: ipmi_si: fix a memleak in try_smi_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-771
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50481
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401558
Bugzilla Description:
kernel: cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53582
Severity: important
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401559
Bugzilla Description:
kernel: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-125
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53570
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2022:1988, RHSA-2024:2394,
Bugzilla: 2401560
Bugzilla Description:
kernel: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-372.9.1.el8,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53546
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401561
Bugzilla Description:
kernel: net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-772
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53537
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401562
Bugzilla Description:
kernel: f2fs: fix to avoid use-after-free for cached IPU bio
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50494
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:6583,
Bugzilla: 2401563
Bugzilla Description:
kernel: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE:
Affected Packages: kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53584
Severity: low
Released on: 04/10/2025
Advisory:
Bugzilla: 2401564
Bugzilla Description:
kernel: ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-367
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50470
Severity: moderate
Released on: 04/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2401565
Bugzilla Description:
kernel: xhci: Remove device endpoints from bandwidth list when freeing the device
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53599
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401566
Bugzilla Description:
kernel: crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53560
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401567
Bugzilla Description:
kernel: tracing/histograms: Add histograms to hist_vars if they have referenced variables
CVSS Score:
CVSSv3 Score: 5.6
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53614
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401568
Bugzilla Description:
kernel: mm/ksm: fix race with VMA iteration and mm_struct teardown
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50501
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401569
Bugzilla Description:
kernel: media: coda: Add check for dcoda_iram_alloc
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50471
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401570
Bugzilla Description:
kernel: xen/gntdev: Accommodate VMA splitting
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53563
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2023:6583,
Bugzilla: 2401571
Bugzilla Description:
kernel: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-911
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53589
Severity: moderate
Released on: 04/10/2025
Advisory:
Bugzilla: 2401572
Bugzilla Description:
kernel: wifi: iwlwifi: mvm: don't trust firmware n_channels
CVSS Score:
CVSSv3 Score: 4.6
Vector:
CWE: CWE-131
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53577
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2401573
Bugzilla Description:
kernel: bpf, cpumap: Make sure kthread is running before map update returns
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-367
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53534
Severity:
Released on: 04/10/2025
Advisory:
Bugzilla: 2401574
Bugzilla Description:
kernel: drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50506
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:2458, RHSA-2022:8267,
Bugzilla: 2401575
Bugzilla Description:
kernel: drbd: only clone bio if we have a backing device
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,kernel-0:5.14.0-162.6.1.el9_1,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50482
Severity: low
Released on: 04/10/2025
Advisory: RHSA-2023:2951, RHSA-2023:0832, RHSA-2023:6583,
Bugzilla: 2401576
Bugzilla Description:
kernel: iommu/vt-d: Clean up si_domain in the init_dmars() error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages: kernel-0:4.18.0-477.10.1.el8_8,kernel-0:4.18.0-425.13.1.el8_7,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-49844
Severity: important
Released on: 03/10/2025
Advisory: RHSA-2025:19318, RHSA-2025:19399, RHSA-2025:19675, RHSA-2025:19345, RHSA-2025:19238, RHSA-2025:18996, RHSA-2025:19239, RHSA-2025:18997, RHSA-2025:18931, RHSA-2025:19237, RHSA-2025:21936, RHSA-2025:20926, RHSA-2025:21916, RHSA-2025:20955, RHSA-2025:19086,
Bugzilla: 2401324
Bugzilla Description:
Redis: Redis Lua Use-After-Free may lead to remote code execution
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-416
Affected Packages: redis:7-9040020251015162111.9,redis:7-9060020251007094800.9,redis-0:6.2.20-2.el9_7,redis:7-9070020251016095039.9,redis-0:6.2.20-1.el9_6,valkey-0:8.0.6-2.el9_7,valkey-0:8.0.6-2.el10_1,valkey-0:8.0.6-1.el10_0,redis-0:6.2.7-1.el9_4.5,redis-0:6.2.7-1.el9_2.5,redis:6-8040020251022121413.522a0ee4,redis:6-8080020251022085755.63b34585,redis:6-8060020251022110425.ad008a3a,redis-0:6.2.6-1.el9_0.5,redis:6-8100020251007064521.489197e6,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-46819
Severity: moderate
Released on: 03/10/2025
Advisory: RHSA-2025:19675, RHSA-2025:19345, RHSA-2025:19238, RHSA-2025:19237, RHSA-2025:21936, RHSA-2025:20926, RHSA-2025:21916, RHSA-2025:20955,
Bugzilla: 2401322
Bugzilla Description:
Redis: Redis is vulnerable to DoS via specially crafted LUA scripts
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-190
Affected Packages: valkey-0:8.0.6-2.el9_7,valkey-0:8.0.6-2.el10_1,valkey-0:8.0.6-1.el10_0,redis:7-9060020251007094800.9,redis-0:6.2.20-2.el9_7,redis:7-9070020251016095039.9,redis-0:6.2.20-1.el9_6,redis:6-8100020251007064521.489197e6,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-46818
Severity: moderate
Released on: 03/10/2025
Advisory: RHSA-2025:19675, RHSA-2025:19345, RHSA-2025:19238, RHSA-2025:19237, RHSA-2025:21936, RHSA-2025:20926, RHSA-2025:21916, RHSA-2025:20955,
Bugzilla: 2401292
Bugzilla Description:
Redis: Redis: Authenticated users can execute LUA scripts as a different user
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-94
Affected Packages: valkey-0:8.0.6-2.el9_7,valkey-0:8.0.6-2.el10_1,valkey-0:8.0.6-1.el10_0,redis:7-9060020251007094800.9,redis-0:6.2.20-2.el9_7,redis:7-9070020251016095039.9,redis-0:6.2.20-1.el9_6,redis:6-8100020251007064521.489197e6,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-46817
Severity: moderate
Released on: 03/10/2025
Advisory: RHSA-2025:19318, RHSA-2025:19399, RHSA-2025:19675, RHSA-2025:19345, RHSA-2025:19238, RHSA-2025:18996, RHSA-2025:19239, RHSA-2025:18997, RHSA-2025:18931, RHSA-2025:19237, RHSA-2025:21936, RHSA-2025:20926, RHSA-2025:21916, RHSA-2025:20955, RHSA-2025:19086,
Bugzilla: 2401258
Bugzilla Description:
redis: Lua library commands may lead to integer overflow and potential RCE
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-190
Affected Packages: redis:7-9040020251015162111.9,redis:7-9060020251007094800.9,redis-0:6.2.20-2.el9_7,redis:7-9070020251016095039.9,redis-0:6.2.20-1.el9_6,valkey-0:8.0.6-2.el9_7,valkey-0:8.0.6-2.el10_1,valkey-0:8.0.6-1.el10_0,redis-0:6.2.7-1.el9_4.5,redis-0:6.2.7-1.el9_2.5,redis:6-8040020251022121413.522a0ee4,redis:6-8080020251022085755.63b34585,redis:6-8060020251022110425.ad008a3a,redis-0:6.2.6-1.el9_0.5,redis:6-8100020251007064521.489197e6,
Package States: Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat AI Inference Server,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Connectivity Link 1,Red Hat Developer Hub,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat OpenStack Platform 13 (Queens),Red Hat Quay 3,Red Hat Satellite 6,
Full Details
CVE document
CVE-2025-10729
Severity: important
Released on: 03/10/2025
Advisory: RHSA-2025:21037, RHSA-2025:19772,
Bugzilla: 2401241
Bugzilla Description:
qtsvg: Use-after-free vulnerability in Qt SVG
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: CWE-416
Affected Packages: qt6-qtsvg-0:6.9.1-2.el10_1.1,qt6-qtsvg-0:6.8.1-1.el10_0.1,
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-10728
Severity: moderate
Released on: 03/10/2025
Advisory:
Bugzilla: 2401244
Bugzilla Description:
qtsvg: Uncontrolled recursion in Qt SVG module
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-674
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-11230
Severity: important
Released on: 03/10/2025
Advisory: RHSA-2025:21693, RHSA-2025:21694, RHSA-2025:21691, RHSA-2025:21692,
Bugzilla: 2413003
Bugzilla Description:
haproxy: denial of service vulnerability in HAProxy mjson library
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-407
Affected Packages: haproxy-0:3.0.5-4.el10_1.1,haproxy-0:2.8.14-1.el9_7.1,haproxy-0:3.0.5-4.el10_0.1,haproxy-0:2.4.22-4.el9_6.1,
Package States: Red Hat Ceph Storage 5,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat OpenShift Container Platform 4,
Full Details
CVE document
CVE-2025-59538
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2025:17730, RHSA-2025:17731, RHSA-2025:18093,
Bugzilla: 2400940
Bugzilla Description:
github.com/argoproj/argo-cd: Argo CD unauthenticated Remote Denial of Service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-248|CWE-703)
Affected Packages: openshift-gitops-1/argocd-rhel8:sha256:bdd0a289775ce41a8b495e02626f2e84b39f27d8eab8e351faf13bd46c8bb843,openshift-gitops-1/gitops-rhel8-operator:sha256:5cdb2206120407d94f409ebb2639c5b61679df14be99d60db25703ab9f9b3ef4,openshift-gitops-1/argocd-rhel9:sha256:b9125f40d94e6aa05df7814a23d47e904ccee9f5204ebcfd994f9432b3feb0fb,openshift-gitops-1/gitops-operator-bundle:sha256:a27b8dd047e10fbbd6fc49176036c9b5178a1d2841e26719bfde23239ede157d,openshift-gitops-1/gitops-operator-bundle:sha256:78dc89a4a9dfb8dcf93224fd9a3caa63ea1551f8da73a88aebb284123d4a2962,openshift-gitops-1/argocd-rhel8:sha256:12e0ab863663d47e2a483839e000eb8fa624bd5766bf706213db295a0e00815f,openshift-gitops-1/argocd-rhel8:sha256:b0408f958ef20c3f6230d392049b261ebfbd50f5f8e5b0e9776b20726fc9c83a,openshift-gitops-1/argocd-rhel9:sha256:c9d9ee712c5432f2ddf0985665a1ebc1ab8dfa49ddfd4829fd0eea8cb29c745d,openshift-gitops-1/gitops-operator-bundle:sha256:4fc82c51692138acd9a7232fc4b3451cbca9f7be763452c811bea7a68867cb93,openshift-gitops-1/argocd-rhel9:sha256:2cb3b46616a69b95620a59b43e9aadbe02e98b984434d1a47410a603de4d1598,
Package States: Red Hat Developer Hub,Red Hat Developer Hub,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,
Full Details
CVE document
CVE-2025-59537
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2025:17730, RHSA-2025:17731, RHSA-2025:18093,
Bugzilla: 2400938
Bugzilla Description:
github.com/argoproj/argo-cd: Argo CD unauthenticated Denial of Service
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-20|CWE-476)
Affected Packages: openshift-gitops-1/argocd-rhel8:sha256:bdd0a289775ce41a8b495e02626f2e84b39f27d8eab8e351faf13bd46c8bb843,openshift-gitops-1/gitops-rhel8-operator:sha256:5cdb2206120407d94f409ebb2639c5b61679df14be99d60db25703ab9f9b3ef4,openshift-gitops-1/argocd-rhel9:sha256:b9125f40d94e6aa05df7814a23d47e904ccee9f5204ebcfd994f9432b3feb0fb,openshift-gitops-1/gitops-operator-bundle:sha256:a27b8dd047e10fbbd6fc49176036c9b5178a1d2841e26719bfde23239ede157d,openshift-gitops-1/gitops-operator-bundle:sha256:78dc89a4a9dfb8dcf93224fd9a3caa63ea1551f8da73a88aebb284123d4a2962,openshift-gitops-1/argocd-rhel8:sha256:12e0ab863663d47e2a483839e000eb8fa624bd5766bf706213db295a0e00815f,openshift-gitops-1/argocd-rhel8:sha256:b0408f958ef20c3f6230d392049b261ebfbd50f5f8e5b0e9776b20726fc9c83a,openshift-gitops-1/argocd-rhel9:sha256:c9d9ee712c5432f2ddf0985665a1ebc1ab8dfa49ddfd4829fd0eea8cb29c745d,openshift-gitops-1/gitops-operator-bundle:sha256:4fc82c51692138acd9a7232fc4b3451cbca9f7be763452c811bea7a68867cb93,openshift-gitops-1/argocd-rhel9:sha256:2cb3b46616a69b95620a59b43e9aadbe02e98b984434d1a47410a603de4d1598,
Package States: Red Hat Developer Hub,Red Hat Developer Hub,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,
Full Details
CVE document
CVE-2025-59531
Severity: important
Released on: 01/10/2025
Advisory: RHSA-2025:17730, RHSA-2025:17731, RHSA-2025:18093,
Bugzilla: 2400935
Bugzilla Description:
argocd: argocd-server: gitops: Unauthenticated argocd-server panic via a malicious Bitbucket-Server webhook payload
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-248
Affected Packages: openshift-gitops-1/argocd-rhel8:sha256:bdd0a289775ce41a8b495e02626f2e84b39f27d8eab8e351faf13bd46c8bb843,openshift-gitops-1/argocd-rhel9:sha256:b9125f40d94e6aa05df7814a23d47e904ccee9f5204ebcfd994f9432b3feb0fb,openshift-gitops-1/gitops-operator-bundle:sha256:a27b8dd047e10fbbd6fc49176036c9b5178a1d2841e26719bfde23239ede157d,openshift-gitops-1/gitops-operator-bundle:sha256:78dc89a4a9dfb8dcf93224fd9a3caa63ea1551f8da73a88aebb284123d4a2962,openshift-gitops-1/argocd-rhel8:sha256:12e0ab863663d47e2a483839e000eb8fa624bd5766bf706213db295a0e00815f,openshift-gitops-1/argocd-rhel8:sha256:b0408f958ef20c3f6230d392049b261ebfbd50f5f8e5b0e9776b20726fc9c83a,openshift-gitops-1/argocd-rhel9:sha256:c9d9ee712c5432f2ddf0985665a1ebc1ab8dfa49ddfd4829fd0eea8cb29c745d,openshift-gitops-1/gitops-operator-bundle:sha256:4fc82c51692138acd9a7232fc4b3451cbca9f7be763452c811bea7a68867cb93,openshift-gitops-1/argocd-rhel9:sha256:2cb3b46616a69b95620a59b43e9aadbe02e98b984434d1a47410a603de4d1598,
Package States:
Full Details
CVE document
CVE-2025-11233
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400867
Bugzilla Description:
rust: Rust standard library didn't detect all path separators on Cygwin
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50440
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400740
Bugzilla Description:
drm/vmwgfx: Validate the box size for the snooped cursor
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document
CVE-2025-11226
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400602
Bugzilla Description:
ch.qos.logback/logback-core: Conditional abitrary code execution in logback-core
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: AMQ Clients,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 8,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Red Hat AMQ Broker 7,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Debezium 2,Red Hat build of Debezium 3,Red Hat build of OptaPlanner 8,Red Hat Data Grid 8,Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Web Server 6,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Process Automation 7,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Single Sign-On 7,streams for Apache Kafka 3,
Full Details
CVE document
CVE-2025-59681
Severity: important
Released on: 01/10/2025
Advisory: RHSA-2025:18984,
Bugzilla: 2400449
Bugzilla Description:
django: Potential SQL injection in QuerySet.annotate(), alias(), aggregate(), and extra() on MySQL and MariaDB1
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-89
Affected Packages: ansible-automation-platform-25/lightspeed-rhel8:2.5.250924-2,
Package States: OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Certification for Red Hat Enterprise Linux 7,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Update Infrastructure 4 for Cloud Providers,
Full Details
CVE document
CVE-2025-59682
Severity: important
Released on: 01/10/2025
Advisory: RHSA-2025:19201, RHSA-2025:19221, RHSA-2025:18984, RHSA-2025:18979,
Bugzilla: 2400450
Bugzilla Description:
django: Potential partial directory-traversal via archive.extract()
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-22
Affected Packages: python3.11-django-0:4.2.25-1.el8ap,ansible-automation-platform-25/lightspeed-rhel8:2.5.250924-2,python3.11-django-0:4.2.25-1.el9ap,ansible-automation-platform-26/lightspeed-rhel9:sha256:40c9b33e0165a6acf554ebea49486ab235b26600554ae14d370a2f0476105803,
Package States: OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,OpenShift Service Mesh 3,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Certification for Red Hat Enterprise Linux 7,Red Hat Discovery 1,Red Hat Discovery 2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Update Infrastructure 4 for Cloud Providers,
Full Details
CVE document
CVE-2025-39912
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400591
Bugzilla Description:
kernel: nfs/localio: restore creds before releasing pageio data
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39910
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400592
Bugzilla Description:
kernel: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39903
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2025:21463, RHSA-2025:21492,
Bugzilla: 2400593
Bugzilla Description:
kernel: of_numa: fix uninitialized memory nodes causing kernel panic
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-476
Affected Packages: kernel-0:6.12.0-124.11.1.el10_1,kernel-0:6.12.0-55.45.1.el10_0,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39902
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400594
Bugzilla Description:
kernel: mm/slub: avoid accessing metadata when pointer is invalid in object_err()
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39913
Severity: low
Released on: 01/10/2025
Advisory:
Bugzilla: 2400595
Bugzilla Description:
kernel: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39894
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400596
Bugzilla Description:
kernel: netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39892
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400597
Bugzilla Description:
kernel: ASoC: soc-core: care NULL dirver name on snd_soc_lookup_component_nolocked()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39898
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2025:22387, RHSA-2025:22388, RHSA-2025:21933,
Bugzilla: 2400598
Bugzilla Description:
kernel: e1000e: fix heap overflow in e1000_set_eeprom
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-122
Affected Packages: kernel-0:5.14.0-570.66.1.el9_6,kernel-rt-0:4.18.0-553.87.1.rt7.428.el8_10,kernel-0:4.18.0-553.87.1.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39915
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400599
Bugzilla Description:
kernel: net: phy: transfer phy_config_inband() locking responsibility to phylink
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39895
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400600
Bugzilla Description:
kernel: sched: Fix sched_numa_find_nth_cpu() if mask offline
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39914
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400601
Bugzilla Description:
kernel: tracing: Silence warning when chunk allocation fails in trace_pid_write
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39901
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400603
Bugzilla Description:
kernel: i40e: remove read access to debugfs files
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39917
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400604
Bugzilla Description:
kernel: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39891
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400605
Bugzilla Description:
kernel: wifi: mwifiex: Initialize the chan_stats array to zero
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39896
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400606
Bugzilla Description:
kernel: accel/ivpu: Prevent recovery work from being queued during device removal
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39893
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400607
Bugzilla Description:
kernel: spi: spi-qpic-snand: unregister ECC engine on probe error and device remove
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39904
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400608
Bugzilla Description:
kernel: arm64: kexec: initialize kexec_buf struct in load_other_segments()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39900
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400609
Bugzilla Description:
kernel: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39899
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400610
Bugzilla Description:
kernel: mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-404
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39905
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400611
Bugzilla Description:
kernel: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39916
Severity: low
Released on: 01/10/2025
Advisory:
Bugzilla: 2400612
Bugzilla Description:
kernel: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39909
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400613
Bugzilla Description:
kernel: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39897
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400614
Bugzilla Description:
kernel: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39908
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400615
Bugzilla Description:
kernel: net: dev_ioctl: take ops lock in hwtstamp lower paths
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39907
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400616
Bugzilla Description:
kernel: mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39906
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400617
Bugzilla Description:
kernel: drm/amd/display: remove oem i2c adapter on finish
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39911
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400618
Bugzilla Description:
kernel: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-772
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39928
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400626
Bugzilla Description:
kernel: i2c: rtl9300: ensure data length is within supported range
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39926
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400627
Bugzilla Description:
kernel: genetlink: fix genl_bind() invoking bind() after -EPERM
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39918
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2025:22392,
Bugzilla: 2400628
Bugzilla Description:
kernel: wifi: mt76: fix linked list corruption
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-119
Affected Packages: kernel-0:5.14.0-570.69.1.el9_6,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39925
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400629
Bugzilla Description:
kernel: can: j1939: implement NETDEV_UNREGISTER notification handler
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-911
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39922
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400630
Bugzilla Description:
kernel: ixgbe: fix incorrect map used in eee linkmode
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39923
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400631
Bugzilla Description:
kernel: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39919
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400632
Bugzilla Description:
kernel: wifi: mt76: mt7996: add missing check for rx wcid entries
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39921
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400633
Bugzilla Description:
kernel: spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39920
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400634
Bugzilla Description:
kernel: pcmcia: Add error handling for add_interval() in do_validate_mem()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39924
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400635
Bugzilla Description:
kernel: erofs: fix invalid algorithm for encoded extents
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2025-39927
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2025:17241,
Bugzilla: 2400636
Bugzilla Description:
kernel: ceph: fix race condition validating r_parent before applying state
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-364
Affected Packages: kernel-0:5.14.0-427.92.1.el9_4,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53458
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400690
Bugzilla Description:
kernel: media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53531
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2024:9315,
Bugzilla: 2400691
Bugzilla Description:
kernel: null_blk: fix poll request timeout handling
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-366
Affected Packages: kernel-0:5.14.0-503.11.1.el9_5,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53461
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400692
Bugzilla Description:
kernel: io_uring: wait interruptibly for request completions on exit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50446
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400693
Bugzilla Description:
kernel: ARC: mm: fix leakage of memory allocated for PTE
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53525
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2400694
Bugzilla Description:
kernel: RDMA/cma: Allow UD qp_type to join multicast only
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-908
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53526
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400695
Bugzilla Description:
kernel: jbd2: check 'jh->b_transaction' before removing it from checkpoint
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53502
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400696
Bugzilla Description:
kernel: xen/netback: Fix buffer overrun triggered by unusual packet
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50437
Severity:
Released on: 01/10/2025
Advisory:
Bugzilla: 2400697
Bugzilla Description:
kernel: drm/msm/hdmi: fix memory corruption with too many bridges
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53454
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400698
Bugzilla Description:
kernel: HID: multitouch: Correct devm device reference for hidinput input_dev name
CVSS Score:
CVSSv3 Score: 4.6
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53459
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400699
Bugzilla Description:
kernel: HID: mcp-2221: prevent UAF in delayed work
CVSS Score:
CVSSv3 Score: 5.8
Vector:
CWE: CWE-825
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53466
Severity: moderate
Released on: 01/10/2025
Advisory: RHSA-2023:7077, RHSA-2023:6583,
Bugzilla: 2400700
Bugzilla Description:
kernel: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-772
Affected Packages: kernel-0:4.18.0-513.5.1.el8_9,kernel-0:5.14.0-362.8.1.el9_3,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53451
Severity: low
Released on: 01/10/2025
Advisory: RHSA-2024:2394, RHSA-2024:3138,
Bugzilla: 2400701
Bugzilla Description:
kernel: scsi: qla2xxx: Fix potential NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages: kernel-0:5.14.0-427.13.1.el9_4,kernel-0:4.18.0-553.el8_10,
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53507
Severity: moderate
Released on: 01/10/2025
Advisory:
Bugzilla: 2400703
Bugzilla Description:
kernel: net/mlx5: Unregister devlink params in case interface is down
CVSS Score:
CVSSv3 Score: 5.2
Vector:
CWE: CWE-459
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50465
Severity: low
Released on: 01/10/2025
Advisory:
Bugzilla: 2400704
Bugzilla Description:
kernel: ext4: fix leaking uninitialized memory in fast-commit journal
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2022-50432
Severity: low
Released on: 01/10/2025
Advisory:
Bugzilla: 2400705
Bugzilla Description:
kernel: kernfs: fix use-after-free in __kernfs_remove
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document
CVE-2023-53518
Severity: low
Released on: 01/10/2025
Advisory:
Bugzilla: 2400706
Bugzilla Description:
kernel: PM / devfreq: Fix leak in devfreq_dev_release()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 10,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document