Critical
Third-party Component |
CVEs |
More Information |
Bind-utils |
CVE-2024-11187 |
|
Cluster-md-kmp-default |
CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 |
|
Curl |
CVE-2024-11053, CVE-2025-0167, CVE-2025-0725 |
|
dlm-kmp-default |
CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 |
|
Emacs |
CVE-2025-1244 |
|
GLib2 |
CVE-2025-0395 |
|
grub2 |
CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2024-56737, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125 |
|
kernel-default
|
CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 |
https://nvd.nist.gov/vuln/search
|
libbind9-160 |
CVE-2009-0696, CVE-2009-4022, CVE-2010-3613, CVE-2010-3614, CVE-2010-3615, CVE-2011-0414, CVE-2011-1907, CVE-2011-1910, CVE-2011-2464, CVE-2011-4313, CVE-2012-1667, CVE-2012-3817, CVE-2012-3868, CVE-2012-4244, CVE-2012-5166, CVE-2012-5688, CVE-2012-5689, CVE-2013-2266, CVE-2013-4854, CVE-2014-0591, CVE-2014-8500, CVE-2015-1349, CVE-2015-4620, CVE-2015-5477, CVE-2015-5722, CVE-2015-8000, CVE-2015-8704, CVE-2016-1285, CVE-2016-1286, CVE-2016-2775, CVE-2016-2776, CVE-2016-6170, CVE-2016-8864, CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3142, CVE-2017-3143, CVE-2017-3145, CVE-2018-5740, CVE-2018-5743, CVE-2018-5745, CVE-2019-6465, CVE-2019-6471, CVE-2020-8616, CVE-2020-8617, CVE-2024-11187 |
|
libfreetype6 |
CVE-2025-27363 |
|
libopenssl1_1
|
CVE-2024-13176
|
|
libtasn1 |
CVE-2024-12133 |
|
libX11 |
CVE-2025-26597 |
|
libxml2 |
CVE-2022-49043, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113 |
|
Openssh8.4 |
CVE-2025-26465 |
|
Oracle JRE 8u441 |
CVE-2025-0509 |
|
Rsync |
CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 |
|
Postgresql14 |
CVE-2025-1094 |
|
Intel |
CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355 |
|
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
Dell Avamar Data Store Gen4T (Single Node) |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9
|
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar Data Store Gen5A |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar Virtual Edition |
SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar Network Data Management Protocol (NDMP) Accelerator |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar VMware Image Backup Proxy |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Networker Virtual Edition (NVE) |
SUSE Linux Enterprise 12 SP5 |
Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 |
Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 |
NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1 |
Dell PowerProtect DP Series Appliance (IDPA) |
SUSE Linux Enterprise 12 SP5 |
Versions prior to 2.7.8 |
Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 |
Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Link |
Dell Avamar Data Store Gen4T (Single Node) |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9
|
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar Data Store Gen5A |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar Virtual Edition |
SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar Network Data Management Protocol (NDMP) Accelerator |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Avamar VMware Image Backup Proxy |
SUSE Linux Enterprise 12 SP5 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 |
Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 |
|
Dell Networker Virtual Edition (NVE) |
SUSE Linux Enterprise 12 SP5 |
Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 |
Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 |
NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1 |
Dell PowerProtect DP Series Appliance (IDPA) |
SUSE Linux Enterprise 12 SP5 |
Versions prior to 2.7.8 |
Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 |
Notes:
Known Issue:
None
Revision |
Date |
Description |
1.0 |
2025-05-30 |
Initial Release |
2.0 |
2025-06-20 |
Minor update to reflect GRUB2 corruption in Avamar Data Store Gen4T (Multi-Node) |