INFSA-2025:20518: kernel security update
Information about definition
Identificator: INFSA-2025:20518
Type: security
Release date: 2025-12-07 22:23:18 UTC
Information about package
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Vulnerabilities description
- CVE-2024-53241
In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page.
- CVE-2024-36350
A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.
- CVE-2025-38396
In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass.
- CVE-2024-36357
A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
- CVE-2022-48830
In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix potential CAN frame reception race in isotp_rcv().
- CVE-2022-49024
In the Linux kernel, the following vulnerability has been resolved: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods.
- CVE-2022-49269
In the Linux kernel, the following vulnerability has been resolved: can: isotp: sanitize CAN ID checks in isotp_bind().
- CVE-2022-49353
In the Linux kernel, the following vulnerability has been resolved: powerpc/papr_scm: don't requests stats with '0' sized stats buffer.
- CVE-2022-49357
In the Linux kernel, the following vulnerability has been resolved: efi: Do not import certificates from UEFI Secure Boot for T2 Macs.
- CVE-2022-49432
In the Linux kernel, the following vulnerability has been resolved: powerpc/xics: fix refcount leak in icp_opal_init().
- CVE-2022-49437
In the Linux kernel, the following vulnerability has been resolved: powerpc/xive: Fix refcount leak in xive_spapr_init.
- CVE-2022-49443
In the Linux kernel, the following vulnerability has been resolved: list: fix a data-race around ep->rdllist.
- CVE-2022-49623
In the Linux kernel, the following vulnerability has been resolved: powerpc/xive/spapr: correct bitmap allocation size.
- CVE-2022-49627
In the Linux kernel, the following vulnerability has been resolved: ima: Fix potential memory leak in ima_init_crypto().
- CVE-2022-49643
In the Linux kernel, the following vulnerability has been resolved: ima: Fix a potential integer overflow in ima_appraise_measurement.
- CVE-2022-49648
In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Fix memory leak problem.
- CVE-2022-49657
In the Linux kernel, the following vulnerability has been resolved: usbnet: fix memory leak in error case.
- CVE-2022-49670
In the Linux kernel, the following vulnerability has been resolved: linux/dim: Fix divide by 0 in RDMA DIM.
- CVE-2022-49672
In the Linux kernel, the following vulnerability has been resolved: net: tun: unlink NAPI from device on destruction.
- CVE-2022-49845
In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_send_one(): fix missing CAN header initialization.
- CVE-2024-46689
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: cmd-db: Map shared memory as WC, not WB.
- CVE-2024-46744
In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.
- CVE-2024-47679
In the Linux kernel, the following vulnerability has been resolved: vfs: fix race between evice_inodes() and find_inode()&iput().
- CVE-2024-47727
In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix "in-kernel MMIO" check.
- CVE-2024-49570
In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TP_printk UAF.
- CVE-2024-49864
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix a race between socket set up and I/O thread creation.
- CVE-2024-50060
In the Linux kernel, the following vulnerability has been resolved: io_uring: check if we need to reschedule during overflow flush.
- CVE-2024-50195
In the Linux kernel, the following vulnerability has been resolved: posix-clock: Fix missing timespec64 check in pc_clock_settime().
- CVE-2024-50294
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix missing locking causing hanging calls.
- CVE-2024-52332
In the Linux kernel, the following vulnerability has been resolved: igb: Fix potential invalid memory access in igb_init_module().
- CVE-2024-53052
In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write.
- CVE-2024-53090
In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion.
- CVE-2024-53119
In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Fix accept_queue memory leak.
- CVE-2024-53135
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN.
- CVE-2024-53170
In the Linux kernel, the following vulnerability has been resolved: block: fix uaf for flush rq while iterating tags.
- CVE-2024-53216
In the Linux kernel, the following vulnerability has been resolved: nfsd: release svc_expkey/svc_export with rcu_work.
- CVE-2024-53229
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the qp flush warnings in req.
- CVE-2024-53680
In the Linux kernel, the following vulnerability has been resolved: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init().
- CVE-2024-54456
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client().
- CVE-2024-56603
In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create().
- CVE-2024-56645
In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting.
- CVE-2024-56662
In the Linux kernel, the following vulnerability has been resolved: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl.
- CVE-2024-56672
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online().
- CVE-2024-56675
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors.
- CVE-2024-56690
In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY.
- CVE-2024-56709
In the Linux kernel, the following vulnerability has been resolved: io_uring: check if iowq is killed before queuing.
- CVE-2024-56739
In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work().
- CVE-2024-56786
In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated.
- CVE-2024-57981
In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix NULL pointer dereference on certain command aborts.
- CVE-2024-57986
In the Linux kernel, the following vulnerability has been resolved: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections.
- CVE-2024-57987
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek().
- CVE-2024-57988
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btbcm: Fix NULL dereference in btbcm_get_board_name().
- CVE-2024-57989
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links.
- CVE-2024-57990
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: fix off by one in mt7925_load_clc().
- CVE-2024-57993
In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check.
- CVE-2024-57995
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev().
- CVE-2024-57998
In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq().
- CVE-2024-58012
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params.
- CVE-2024-58014
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy().
- CVE-2024-58015
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error.
- CVE-2024-58057
In the Linux kernel, the following vulnerability has been resolved: idpf: convert workqueues to unbound.
- CVE-2024-58062
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference.
- CVE-2024-58068
In the Linux kernel, the following vulnerability has been resolved: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized.
- CVE-2024-58072
In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv.
- CVE-2024-58075
In the Linux kernel, the following vulnerability has been resolved: crypto: tegra - do not transfer req when tegra init fails.
- CVE-2024-58077
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback.
- CVE-2024-58083
In the Linux kernel, the following vulnerability has been resolved: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu().
- CVE-2024-58088
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix deadlock when freeing cgroup storage.
- CVE-2025-21631
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq().
- CVE-2025-21647
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts.
- CVE-2025-21648
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX.
- CVE-2025-21671
In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table.
- CVE-2025-21672
In the Linux kernel, the following vulnerability has been resolved: afs: Fix merge preference rule failure condition.
- CVE-2025-21691
In the Linux kernel, the following vulnerability has been resolved: cachestat: fix page cache statistics permission checking.
- CVE-2025-21693
In the Linux kernel, the following vulnerability has been resolved: mm: zswap: properly synchronize freeing resources during CPU hotunplug.
- CVE-2025-21696
In the Linux kernel, the following vulnerability has been resolved: mm: clear uffd-wp PTE/PMD state on mremap().
- CVE-2025-21702
In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0.
- CVE-2025-21714
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix implicit ODP use after free.
- CVE-2025-21726
In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work.
- CVE-2025-21728
In the Linux kernel, the following vulnerability has been resolved: bpf: Send signals asynchronously if !preemptible.
- CVE-2025-21729
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion.
- CVE-2025-21738
In the Linux kernel, the following vulnerability has been resolved: ata: libata-sff: Ensure that we cannot write outside the allocated buffer.
- CVE-2025-21739
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix use-after free in init error and remove paths.
- CVE-2025-21745
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix class @block_class's subsystem refcount leakage.
- CVE-2025-21746
In the Linux kernel, the following vulnerability has been resolved: Input: synaptics - fix crash when enabling pass-through port.
- CVE-2025-21765
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss().
- CVE-2025-21786
In the Linux kernel, the following vulnerability has been resolved: workqueue: Put the pwq after detaching the rescuer from the pool.
- CVE-2025-21787
In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation.
- CVE-2025-21790
In the Linux kernel, the following vulnerability has been resolved: vxlan: check vxlan_vnigroup_init() return value.
- CVE-2025-21791
In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out().
- CVE-2025-21795
In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback.
- CVE-2025-21796
In the Linux kernel, the following vulnerability has been resolved: nfsd: clear acl_access/acl_default after releasing them.
- CVE-2025-21806
In the Linux kernel, the following vulnerability has been resolved: net: let net.core.dev_weight always be non-zero.
- CVE-2025-21826
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject mismatching sum of field_len with set key length.
- CVE-2025-21828
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs.
- CVE-2025-21829
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]".
- CVE-2025-21837
In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time.
- CVE-2025-21839
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop.
- CVE-2025-21844
In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard().
- CVE-2025-21846
In the Linux kernel, the following vulnerability has been resolved: acct: perform last write from work queue.
- CVE-2025-21847
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data().
- CVE-2025-21848
In the Linux kernel, the following vulnerability has been resolved: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc().
- CVE-2025-21851
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix softlockup in arena_map_free on 64k page kernel.
- CVE-2025-21853
In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation.
- CVE-2025-21855
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS.
- CVE-2025-21861
In the Linux kernel, the following vulnerability has been resolved: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize().
- CVE-2025-21863
In the Linux kernel, the following vulnerability has been resolved: io_uring: prevent opcode speculation.
- CVE-2025-21864
In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst.
- CVE-2025-22056
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_tunnel: fix geneve_opt type confusion addition.
- CVE-2025-37994
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: displayport: Fix NULL pointer access.
- CVE-2025-38116
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix uaf in ath12k_core_init().
Severity level
| CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
|---|---|---|---|
|
NIST — CVE-2022-48830
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49024
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49269
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49353
|
no information | 4.4 | no information |
|
NIST — CVE-2022-49357
|
no information | 6.1 | no information |
|
NIST — CVE-2022-49432
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49437
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49443
|
no information | 4.7 | no information |
|
NIST — CVE-2022-49623
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49627
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49643
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49648
|
no information | 4.4 | no information |
|
NIST — CVE-2022-49657
|
no information | 4.7 | no information |
|
NIST — CVE-2022-49670
|
no information | 5.5 | no information |
|
NIST — CVE-2022-49672
|
no information | 4.7 | no information |
|
NIST — CVE-2022-49845
|
no information | 5.5 | no information |
|
NIST — CVE-2024-36350
|
no information | 5.6 | no information |
|
NIST — CVE-2024-36357
|
no information | 5.6 | no information |
|
NIST — CVE-2024-46689
|
no information | 4.4 | no information |
|
NIST — CVE-2024-46744
|
no information | 5.5 | no information |
|
NIST — CVE-2024-47679
|
no information | 4.7 | no information |
|
NIST — CVE-2024-47727
|
no information | 7.8 | no information |
|
NIST — CVE-2024-49570
|
no information | 6.0 | no information |
|
NIST — CVE-2024-49864
|
no information | 4.7 | no information |
|
NIST — CVE-2024-50060
|
no information | 5.5 | no information |
|
NIST — CVE-2024-50195
|
no information | 5.5 | no information |
|
NIST — CVE-2024-50294
|
no information | 5.5 | no information |
|
NIST — CVE-2024-52332
|
no information | 4.7 | no information |
|
NIST — CVE-2024-53052
|
no information | 4.4 | no information |
|
NIST — CVE-2024-53090
|
no information | 5.5 | no information |
|
NIST — CVE-2024-53119
|
no information | 6.1 | no information |
|
NIST — CVE-2024-53135
|
no information | 6.5 | no information |
|
NIST — CVE-2024-53170
|
no information | 6.7 | no information |
|
NIST — CVE-2024-53216
|
no information | 7.1 | no information |
|
NIST — CVE-2024-53229
|
no information | 7.0 | no information |
|
NIST — CVE-2024-53241
|
no information | 5.7 | no information |
|
NIST — CVE-2024-53680
|
no information | 5.5 | no information |
|
NIST — CVE-2024-54456
|
no information | 7.1 | no information |
|
NIST — CVE-2024-56603
|
no information | 7.3 | no information |
|
NIST — CVE-2024-56645
|
no information | 7.1 | no information |
|
NIST — CVE-2024-56662
|
no information | 6.0 | no information |
|
NIST — CVE-2024-56672
|
no information | 6.4 | no information |
|
NIST — CVE-2024-56675
|
no information | 6.7 | no information |
|
NIST — CVE-2024-56690
|
no information | 5.5 | no information |
|
NIST — CVE-2024-56709
|
no information | 4.4 | no information |
|
NIST — CVE-2024-56739
|
no information | 5.5 | no information |
|
NIST — CVE-2024-56786
|
no information | no information | no information |
|
NIST — CVE-2024-57981
|
no information | 5.5 | no information |
|
NIST — CVE-2024-57986
|
no information | 4.4 | no information |
|
NIST — CVE-2024-57987
|
no information | 5.5 | no information |
|
NIST — CVE-2024-57988
|
no information | 5.5 | no information |
|
NIST — CVE-2024-57989
|
no information | 4.4 | no information |
|
NIST — CVE-2024-57990
|
no information | 7.8 | no information |
|
NIST — CVE-2024-57993
|
no information | 3.3 | no information |
|
NIST — CVE-2024-57995
|
no information | 6.7 | no information |
|
NIST — CVE-2024-57998
|
no information | 7.1 | no information |
|
NIST — CVE-2024-58012
|
no information | 4.4 | no information |
|
NIST — CVE-2024-58014
|
no information | 6.0 | no information |
|
NIST — CVE-2024-58015
|
no information | 6.0 | no information |
|
NIST — CVE-2024-58057
|
no information | 4.4 | no information |
|
NIST — CVE-2024-58062
|
no information | 5.5 | no information |
|
NIST — CVE-2024-58068
|
no information | 5.5 | no information |
|
NIST — CVE-2024-58072
|
no information | 6.4 | no information |
|
NIST — CVE-2024-58075
|
no information | 6.0 | no information |
|
NIST — CVE-2024-58077
|
no information | 4.4 | no information |
|
NIST — CVE-2024-58083
|
no information | 5.5 | no information |
|
NIST — CVE-2024-58088
|
no information | 4.4 | no information |
|
NIST — CVE-2025-21631
|
no information | 6.0 | no information |
|
NIST — CVE-2025-21647
|
no information | 7.1 | no information |
|
NIST — CVE-2025-21648
|
no information | 7.1 | no information |
|
NIST — CVE-2025-21671
|
no information | 6.7 | no information |
|
NIST — CVE-2025-21672
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21691
|
no information | 7.1 | no information |
|
NIST — CVE-2025-21693
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21696
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21702
|
no information | 7.0 | no information |
|
NIST — CVE-2025-21714
|
no information | 6.7 | no information |
|
NIST — CVE-2025-21726
|
no information | 7.0 | no information |
|
NIST — CVE-2025-21728
|
no information | 4.4 | no information |
|
NIST — CVE-2025-21729
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21738
|
no information | 6.7 | no information |
|
NIST — CVE-2025-21739
|
no information | 6.7 | no information |
|
NIST — CVE-2025-21745
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21746
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21765
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21786
|
no information | 7.8 | no information |
|
NIST — CVE-2025-21787
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21790
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21791
|
no information | 7.1 | no information |
|
NIST — CVE-2025-21795
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21796
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21806
|
no information | 3.3 | no information |
|
NIST — CVE-2025-21826
|
no information | 6.1 | no information |
|
NIST — CVE-2025-21828
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21829
|
no information | 4.4 | no information |
|
NIST — CVE-2025-21837
|
no information | no information | no information |
|
NIST — CVE-2025-21839
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21844
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21846
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21847
|
no information | 4.4 | no information |
|
NIST — CVE-2025-21848
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21851
|
no information | 2.3 | no information |
|
NIST — CVE-2025-21853
|
no information | 4.4 | no information |
|
NIST — CVE-2025-21855
|
no information | 6.4 | no information |
|
NIST — CVE-2025-21861
|
no information | 5.5 | no information |
|
NIST — CVE-2025-21863
|
no information | 7.1 | no information |
|
NIST — CVE-2025-21864
|
no information | 4.7 | no information |
|
NIST — CVE-2025-22056
|
no information | 7.0 | no information |
|
NIST — CVE-2025-37994
|
no information | 6.4 | no information |
|
NIST — CVE-2025-38116
|
no information | 4.1 | no information |
|
NIST — CVE-2025-38396
|
no information | 6.0 | no information |
Updated packages