This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET | CVE-2025-24043 | WinDbg Remote Code Execution Vulnerability |
Microsoft | ASP.NET Core & Visual Studio | CVE-2025-24070 | ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Azure Agent Installer | CVE-2025-21199 | Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability |
Microsoft | Azure Arc | CVE-2025-26627 | Azure Arc Installer Elevation of Privilege Vulnerability |
Microsoft | Azure CLI | CVE-2025-24049 | Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability |
Microsoft | Azure PromptFlow | CVE-2025-24986 | Azure Promptflow Remote Code Execution Vulnerability |
Microsoft | Kernel Streaming WOW Thunk Service Driver | CVE-2025-24995 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-43098 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53165 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53157 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53156 | Unknown |
security@golang.org | Mariner | CVE-2025-22868 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53146 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-27026 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-35790 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-12133 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-26943 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3833 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-40982 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-35792 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-27061 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53171 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56606 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56622 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56593 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56601 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56704 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56698 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56602 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56574 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53237 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53227 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56369 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53217 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56578 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56572 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56569 | Unknown |
security@ubuntu.com | Mariner | CVE-2022-28737 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-3727 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-52006 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-50349 | Unknown |
cve@mitre.org | Mariner | CVE-2017-18207 | Unknown |
cve@mitre.org | Mariner | CVE-2017-17522 | Unknown |
security@golang.org | Mariner | CVE-2022-32149 | Unknown |
security@golang.org | Mariner | CVE-2024-45338 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56777 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57901 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56728 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56774 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26595 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26598 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26596 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26594 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-20286 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-32021 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-25629 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-32465 | Unknown |
cve@mitre.org | Mariner | CVE-2024-37535 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-1393 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40549 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40546 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-1182 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-1181 | Unknown |
cve@mitre.org | Mariner | CVE-2007-4559 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-1176 | Unknown |
cve@mitre.org | Mariner | CVE-2020-22217 | Unknown |
cve-assign@fb.com | Mariner | CVE-2021-24032 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-1178 | Unknown |
cve@mitre.org | Mariner | CVE-2015-9251 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56648 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56650 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56643 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56629 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56688 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56694 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56670 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56623 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56596 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56587 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56595 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56614 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56603 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56615 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56605 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56708 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26600 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-27516 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-50302 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26597 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26599 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-27423 | Unknown |
cve_disclosure@tech.gov.sg | Mariner | CVE-2025-1744 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57902 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56756 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56745 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56747 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56770 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57850 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56787 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56781 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56778 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56779 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56776 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56780 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57896 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57874 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56785 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56748 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56716 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56642 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56715 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56726 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56739 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56723 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56746 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57841 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53239 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53206 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53096 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53173 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56581 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56575 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53226 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53145 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57946 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-36476 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57890 | Unknown |
cna@python.org | Mariner | CVE-2024-9287 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-48881 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-50051 | Unknown |
security@golang.org | Mariner | CVE-2025-22869 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3816 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-20277 | Unknown |
cve@mitre.org | Mariner | CVE-2024-50608 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26466 | Unknown |
cve@mitre.org | Mariner | CVE-2022-40898 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-7383 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-32746 | Unknown |
secure@intel.com | Mariner | CVE-2019-14584 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2023-52917 | Unknown |
cve@mitre.org | Mariner | CVE-2024-50609 | Unknown |
security@apache.org | Mariner | CVE-2021-36374 | Unknown |
security@apache.org | Mariner | CVE-2021-36373 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-1454 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-26618 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-27144 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2024-9681 | Unknown |
secalert@redhat.com | Mariner | CVE-2020-27840 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40550 | Unknown |
security@hashicorp.com | Mariner | CVE-2024-6104 | Unknown |
facts@wolfssl.com | Mariner | CVE-2024-5288 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-3672 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56627 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40548 | Unknown |
report@snyk.io | Mariner | CVE-2021-23336 | Unknown |
security@apache.org | Mariner | CVE-2024-52338 | Unknown |
cve@mitre.org | Mariner | CVE-2012-6708 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-32020 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-34062 | Unknown |
cve@mitre.org | Mariner | CVE-2019-20907 | Unknown |
security@golang.org | Mariner | CVE-2023-45288 | Unknown |
secalert@redhat.com | Mariner | CVE-2012-2677 | Unknown |
cve@mitre.org | Mariner | CVE-2019-9674 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40660 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-47143 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-45828 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53155 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53161 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57807 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57802 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57938 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-57900 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56662 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-26601 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56724 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56659 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56548 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-55916 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56626 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56600 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53150 | Unknown |
cve@kernel.org | Mariner | CVE-2024-26973 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53215 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53151 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56741 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-50181 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-0840 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-39908 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56640 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56634 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56754 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56720 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56568 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-53180 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56598 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-56567 | Unknown |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1918 | Chromium: CVE-2025-1918 Out of bounds read in PDFium |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1919 | Chromium: CVE-2025-1919 Out of bounds read in Media |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1916 | Chromium: CVE-2025-1916 Use after free in Profiles |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1917 | Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1922 | Chromium: CVE-2025-1922 Inappropriate Implementation in Selection |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1923 | Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1921 | Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1914 | Chromium: CVE-2025-1914 Out of bounds read in V8 |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2025-26643 | Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-1915 | Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools |
Microsoft | Microsoft Local Security Authority Server (lsasrv) | CVE-2025-24072 | Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Management Console | CVE-2025-26633 | Microsoft Management Console Security Feature Bypass Vulnerability |
Microsoft | Microsoft Office | CVE-2025-24083 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-26629 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-24080 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-24057 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Access | CVE-2025-26630 | Microsoft Access Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-24081 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-24082 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-24075 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-24077 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-24078 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-24079 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2025-24046 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2025-24067 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
Microsoft | Microsoft Windows | CVE-2025-25008 | Windows Server Elevation of Privilege Vulnerability |
Synaptics, Inc. | Microsoft Windows | CVE-2024-9157 | Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability |
Microsoft | Remote Desktop Client | CVE-2025-26645 | Remote Desktop Client Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2025-24064 | Windows Domain Name Service Remote Code Execution Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-24048 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-24050 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Visual Studio | CVE-2025-24998 | Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Visual Studio | CVE-2025-25003 | Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Visual Studio Code | CVE-2025-26631 | Visual Studio Code Elevation of Privilege Vulnerability |
Microsoft | Windows Common Log File System Driver | CVE-2025-24059 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Cross Device Service | CVE-2025-24994 | Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability |
Microsoft | Windows Cross Device Service | CVE-2025-24076 | Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability |
Microsoft | Windows exFAT File System | CVE-2025-21180 | Windows exFAT File System Remote Code Execution Vulnerability |
Microsoft | Windows Fast FAT Driver | CVE-2025-24985 | Windows Fast FAT File System Driver Remote Code Execution Vulnerability |
Microsoft | Windows File Explorer | CVE-2025-24071 | Microsoft Windows File Explorer Spoofing Vulnerability |
Microsoft | Windows Kernel Memory | CVE-2025-24997 | DirectX Graphics Kernel File Denial of Service Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2025-24066 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
Microsoft | Windows MapUrlToZone | CVE-2025-21247 | MapUrlToZone Security Feature Bypass Vulnerability |
Microsoft | Windows Mark of the Web (MOTW) | CVE-2025-24061 | Windows Mark of the Web Security Feature Bypass Vulnerability |
Microsoft | Windows NTFS | CVE-2025-24993 | Windows NTFS Remote Code Execution Vulnerability |
Microsoft | Windows NTFS | CVE-2025-24984 | Windows NTFS Information Disclosure Vulnerability |
Microsoft | Windows NTFS | CVE-2025-24992 | Windows NTFS Information Disclosure Vulnerability |
Microsoft | Windows NTFS | CVE-2025-24991 | Windows NTFS Information Disclosure Vulnerability |
Microsoft | Windows NTLM | CVE-2025-24996 | NTLM Hash Disclosure Spoofing Vulnerability |
Microsoft | Windows NTLM | CVE-2025-24054 | NTLM Hash Disclosure Spoofing Vulnerability |
Microsoft | Windows Remote Desktop Services | CVE-2025-24035 | Windows Remote Desktop Services Remote Code Execution Vulnerability |
Microsoft | Windows Remote Desktop Services | CVE-2025-24045 | Windows Remote Desktop Services Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-24051 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Subsystem for Linux | CVE-2025-24084 | Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability |
Microsoft | Windows Telephony Server | CVE-2025-24056 | Windows Telephony Service Remote Code Execution Vulnerability |
Microsoft | Windows USB Video Driver | CVE-2025-24988 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows USB Video Driver | CVE-2025-24987 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows USB Video Driver | CVE-2025-24055 | Windows USB Video Class System Driver Information Disclosure Vulnerability |
Microsoft | Windows Win32 Kernel Subsystem | CVE-2025-24044 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability |
Microsoft | Windows Win32 Kernel Subsystem | CVE-2025-24983 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24035
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24035 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Critical | Remote Code Execution | 5052040 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Critical | Remote Code Execution | 5052040 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Critical | Remote Code Execution | 5052016 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Critical | Remote Code Execution | 5052016 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Critical | Remote Code Execution | 5051980 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24035 | ʌ!ɔ⊥ojv with Kunlun Lab Anonymous Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-9157
MITRE NVD Issuing CNA: Synaptics, Inc. |
CVE Title: Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
CVSS: None Executive Summary: None FAQ: Why is this Synaptics CVE included in the Security Update Guide? The vulnerability assigned to this CVE is Synaptics' Audio Effects component, which is consumed by Microsoft Windows. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-9157 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: N/A Temporal: N/A Vector: N/A |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: N/A Temporal: N/A Vector: N/A |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: N/A Temporal: N/A Vector: N/A |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: N/A Temporal: N/A Vector: N/A |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: N/A Temporal: N/A Vector: N/A |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: N/A Temporal: N/A Vector: N/A |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: N/A Temporal: N/A Vector: N/A |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2024-9157 | Harrison Neal with PatchAdvisor |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24044
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24044 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24044 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24043
MITRE NVD Issuing CNA: Microsoft |
CVE Title: WinDbg Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24043 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
WinDbg | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2502.25002.0 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24043 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24057
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24057 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002693 (Security Update) | Critical | Remote Code Execution | 5002686 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002693 (Security Update) | Critical | Remote Code Execution | 5002686 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24057 | 0x140ce(Peace & Love) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24070
MITRE NVD Issuing CNA: Microsoft |
CVE Title: ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24070 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
ASP.NET Core 8.0 | 5054229 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
8.0.14 |
Maybe | None | |
ASP.NET Core 9.0 | 5054230 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
9.0.3 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
17.10.12 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.12 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
17.12.6 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.13 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
17.13.3 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C |
17.8.19 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24070 | Zahid TOKAT |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24077
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24077 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24077 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24078
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24078 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Word 2016 (32-bit edition) | 5002662 (Security Update) | Important | Remote Code Execution | 5002619 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18526.20080 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002662 (Security Update) | Important | Remote Code Execution | 5002619 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18526.20080 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24078 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24079
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24079 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Word 2016 (32-bit edition) | 5002662 (Security Update) | Important | Remote Code Execution | 5002619 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18526.20080 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002662 (Security Update) | Important | Remote Code Execution | 5002619 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18526.20080 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24079 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24080
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24080 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002693 (Security Update) | Important | Remote Code Execution | 5002686 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002693 (Security Update) | Important | Remote Code Execution | 5002686 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-24080 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24081
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24081 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002696 (Security Update) 5002694 (Security Update) |
Important | Remote Code Execution | 5002687 5002684 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002696 (Security Update) 5002694 (Security Update) |
Important | Remote Code Execution | 5002687 5002684 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Office Online Server | 5002690 (Security Update) | Important | Remote Code Execution | 5002679 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10416.20073 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24081 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24082
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24082 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002696 (Security Update) | Important | Remote Code Execution | 5002687 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002696 (Security Update) | Important | Remote Code Execution | 5002687 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Office Online Server | 5002690 (Security Update) | Important | Remote Code Execution | 5002679 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10416.20073 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24082 | f4 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24083
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24083 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002693 (Security Update) | Important | Remote Code Execution | 5002686 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002693 (Security Update) | Important | Remote Code Execution | 5002686 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24083 | 0x140ce(Peace & Love) Exodus Intelligence Vendor Disclosure Team with Exodus Intelligence Exodus Intelligence Vendor Disclosure Team with Exodus Intelligence |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24986
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Promptflow Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, Confidentiality and Integrity are rated as Low and Availability is None (C:L, I:L, A:N). What does that mean for this vulnerability? While an attacker can access some data, that data is not customer’s data, or any highly sensitive/critical information; furthermore an attacker cannot affect the availability of the product. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24986 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure promptflow-core | Release Notes (Security Update) | Important | Remote Code Execution | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
1.17.2 |
No | None | |
Azure promptflow-tools | Release Notes (Security Update) | Important | Remote Code Execution | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
1.6.0 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-24986 | l1k3beef |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24987
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Executive Summary: Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24987 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24987 | Adel and Benjamin Rodes |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24988
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Executive Summary: Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24988 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 6.6 Temporal: 5.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24988 | Adel and Benjamin Rodes. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21180
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows exFAT File System Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Remote Code Execution | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21180 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24995
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24995 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24995 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24996
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24996 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Spoofing | 5052040 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Spoofing | 5052040 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Spoofing | 5052016 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Spoofing | 5052016 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Spoofing | 5052020 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Spoofing | 5052020 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Spoofing | 5052042 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Spoofing | 5052042 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051979 5052106 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051979 5052106 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Spoofing | 5051980 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24996 | Aakriti Shukla with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24997
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel File Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Executive Summary: Null pointer dereference in Windows Kernel Memory allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24997 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Denial of Service | 5051974 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Denial of Service | 5051974 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Denial of Service | 5051974 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Denial of Service | 5051974 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Denial of Service | 5051974 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Denial of Service | 5051974 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Denial of Service | 5051989 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Denial of Service | 5051989 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Denial of Service | 5051989 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Denial of Service | 5051989 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5051987 5052105 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5051987 5052105 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5051979 5052106 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5051979 5052106 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Denial of Service | 5051980 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5051987 5052105 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5051987 5052105 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24997 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24998
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. According to the CVSS metric, the attack vector is local (AV:L), privileges are low (PR:L), and user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an authenticated attacker to place a specially crafted .dll file in a local network location. When a victim runs this file, it loads the malicious DLL. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24998 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.71 |
Maybe | None | |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.45 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.12 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.12 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.12.6 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.13 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.13.3 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.19 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24998 | Polar Penguin |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25003
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25003 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.45 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.12 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.12 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.12.6 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.13 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.13.3 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.19 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-25003 | ycdxsb |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25008
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete targeted files on a system. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25008 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) | Important | Elevation of Privilege | 5051979 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) | Important | Elevation of Privilege | 5051979 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) | Important | Elevation of Privilege | 5051987 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) | Important | Elevation of Privilege | 5051987 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-25008 | Lockheed Martin Red Team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1919
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1919 Out of bounds read in Media
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1919 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1919 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1916
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1916 Use after free in Profiles
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1916 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1916 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1918
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1918 Out of bounds read in PDFium
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1918 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1918 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1917
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1917 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1917 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1921
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1921 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1921 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1915
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1915 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1915 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1923
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1923 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1923 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1922
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1922 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1922 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-1914
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-1914 Out of bounds read in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1914 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-1914 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21247
MITRE NVD Issuing CNA: Microsoft |
CVE Title: MapUrlToZone Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.9
Executive Summary: Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21247 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Security Feature Bypass | 5052040 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Security Feature Bypass | 5052040 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) 5053593 (IE Cumulative) |
Important | Security Feature Bypass | 5052038 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.23168 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) 5053593 (IE Cumulative) |
Important | Security Feature Bypass | 5052038 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.23168 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Security Feature Bypass | 5052038 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Security Feature Bypass | 5052038 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053593 (IE Cumulative) 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Security Feature Bypass | 5052016 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
1.000 6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053593 (IE Cumulative) 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Security Feature Bypass | 5052016 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
1.000 6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Security Feature Bypass | 5052020 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Security Feature Bypass | 5052020 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053593 (IE Cumulative) 5053887 (Monthly Rollup) |
Important | Security Feature Bypass | 5052042 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
1.000 6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053593 (IE Cumulative) 5053887 (Monthly Rollup) |
Important | Security Feature Bypass | 5052042 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
1.000 6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051979 5052106 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051979 5052106 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Security Feature Bypass | 5051980 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21247 | George Hughey with MSRC Vulnerabilities & Mitigations George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-21199
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an administrator to install the VM agent on the target device where an attacker has planted specially crafted malicious files. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. What are the fixed build numbers for the versions of Azure Site Recovery addressed in Update Rollup 76 for Azure Site Recovery?
**Are there any any prerequisites for installing the update? To install Microsoft Azure Site Recovery Provider Update Rollup 76, you must have one of the following installed:
Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21199 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Agent for Backup | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.0.9940.0 |
Maybe | None | |
Azure Agent for Site Recovery | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
9.30 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-21199 | R4nger & Zhiniang Peng |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24045
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24045 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Critical | Remote Code Execution | 5051980 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24045 | ʌ!ɔ⊥ojv with Kunlun Lab Ashana Sharan with Microsoft India |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24046
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24046 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24046 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24048
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24048 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24048 | ChengBin Wang with ZheJiang Guoli Security Technology |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24050
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24050 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24050 | ChengBin Wang with ZheJiang Guoli Security Technology |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24051
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24051 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Remote Code Execution | 5051980 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24051 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24054
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24054 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Spoofing | 5052040 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Spoofing | 5052040 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Spoofing | 5052016 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Spoofing | 5052016 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Spoofing | 5052020 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Spoofing | 5052020 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Spoofing | 5052042 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Spoofing | 5052042 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051979 5052106 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051979 5052106 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Spoofing | 5051980 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24054 | Rintaro Koike with NTT Security Holdings j00sean |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24055
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows USB Video Class System Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24055 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Information Disclosure | 5052016 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Information Disclosure | 5052016 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Information Disclosure | 5051980 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24055 | Adel from MSRC V&M |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24056
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24056 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Remote Code Execution | 5051980 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24056 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24059
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24059 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24059 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24061
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally. FAQ: How could an attacker exploit the vulnerability?
In all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment. Please see Additional information about Mark of the Web for further clarification What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited the vulnerability could evade Mark of the Web (MOTW) defenses. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24061 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Security Feature Bypass | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Security Feature Bypass | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Security Feature Bypass | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24061 | SkorikARI with SkorikARI |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24064
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Domain Name Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Use after free in DNS Server allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? In a network-based attack an attacker sending a dynamic DNS update message with perfect timing to a DNS server could potentially execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24064 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Critical | Remote Code Execution | 5052016 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Critical | Remote Code Execution | 5052016 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Critical | Remote Code Execution | 5051980 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24064 | Jay Ladhad with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24066
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24066 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24066 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24067
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24067 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24067 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24071
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24071 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Spoofing | 5052040 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Spoofing | 5052040 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Spoofing | 5051974 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Spoofing | 5051989 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Spoofing | 5052042 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Spoofing | 5052042 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Spoofing | 5052006 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Spoofing | 5052000 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051979 5052106 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051979 5052106 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Spoofing | 5051980 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Spoofing | 5051987 5052105 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24071 | SkorikARI with SkorikARI Wayne Low of Synapxe |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24072
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24072 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Elevation of Privilege | 5051974 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Elevation of Privilege | 5052000 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051979 5052106 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24072 | Florian Schweins |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24075
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24075 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002696 (Security Update) | Important | Remote Code Execution | 5002687 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002696 (Security Update) | Important | Remote Code Execution | 5002687 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.95.25030928 |
Maybe | None | |
Office Online Server | 5002690 (Security Update) | Important | Remote Code Execution | 5002679 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10416.20073 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24075 | Li Shuang and willJ with Vulnerability Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24076
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option). What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24076 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Elevation of Privilege | 5051980 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24076 | John Ostrowski with Compass Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24084
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally. FAQ: How could an attacker exploit this vulnerability? Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message. In the worst-case email attack scenario, an attacker could send a specially crafted email to the user without a requirement that the victim open, read, or click on the link. This could result in the attacker executing remote code on the victim's machine. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk (UI:N). According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24084 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051979 5052106 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Critical | Remote Code Execution | 5051980 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5051987 5052105 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24084 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24983
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.5
Executive Summary: Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-24983 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Elevation of Privilege | 5052040 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Elevation of Privilege | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Elevation of Privilege | 5052016 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Elevation of Privilege | 5052020 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Elevation of Privilege | 5052042 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Elevation of Privilege | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24983 | Filip Jurčacko with ESET |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24984
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.3
Executive Summary: Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. FAQ: According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability? An attacker needs physical access to the target computer to plug in a malicious USB drive. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-24984 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Information Disclosure | 5051980 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24984 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24985
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Fast FAT File System Driver Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-24985 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Remote Code Execution | 5051980 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24985 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24991
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.1
Executive Summary: Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-24991 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Information Disclosure | 5052016 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Information Disclosure | 5052016 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Information Disclosure | 5051980 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24991 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24992
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24992 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Information Disclosure | 5052040 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Information Disclosure | 5051974 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Information Disclosure | 5051989 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Information Disclosure | 5052038 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Information Disclosure | 5052016 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Information Disclosure | 5052016 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Information Disclosure | 5052020 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Information Disclosure | 5052042 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Information Disclosure | 5052006 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Information Disclosure | 5052000 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051979 5052106 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Information Disclosure | 5051980 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5051987 5052105 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24992 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24993
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-24993 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Remote Code Execution | 5052040 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Remote Code Execution | 5051974 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Remote Code Execution | 5051989 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Remote Code Execution | 5052038 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Remote Code Execution | 5052016 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Remote Code Execution | 5052020 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Remote Code Execution | 5052042 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Remote Code Execution | 5052006 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Remote Code Execution | 5052000 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051979 5052106 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Remote Code Execution | 5051980 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5051987 5052105 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24993 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24994
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option). Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24994 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Elevation of Privilege | 5051989 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5051987 5052105 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24994 | John Ostrowski with Compass Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24049
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by passing a specially crafted key-value argument to Azure CLI, injecting arbitrary Python code that modifies runtime behavior. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24049 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure CLI | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.69.0 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24049 | Zhengyu Liu and Jiacheng(Gavin) Zhong with Johns Hopkins University Zhengyu Liu with Johns Hopkins University Jiacheng(Gavin) Zhong with Johns Hopkins University |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26627
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Arc Installer Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How do I know if I'm affected by this vulnerability? Only machines onboarded via Group Policy that have the GPO applied to them are affected. The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589' What steps are needed to protect from this vulnerability?
For further information, please go to the Arc blade of Azure Portal and follow the instructions for GPO onboarding. Only machines onboarded via Group Policy that have the GPO applied to them are affected The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589' According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to carefully time their actions to exploit the timing differences in the execution of specific operations. They must accurately measure these timing variations to infer sensitive information or gain unauthorized access. This often involves sophisticated techniques to manipulate and observe the timing behavior of the target system. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26627 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure ARC | What's new (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.0.10 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-26627 | SP with WithSecure Consulting |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26629
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26629 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-26629 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26630
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Access Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26630 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Access 2016 (32-bit edition) | 5002697 (Security Update) | Important | Remote Code Execution | 5002670 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Access 2016 (64-bit edition) | 5002697 (Security Update) | Important | Remote Code Execution | 5002670 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5491.1001 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-26630 | Unpatched.ai |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26631
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Code Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26631 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Visual Studio Code | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.98.0 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-26631 | Sandro Poppi |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26633
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Management Console Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.5
Executive Summary: Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. How could an attacker exploit the vulnerability? In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the vulnerability. In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-26633 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Important | Security Feature Bypass | 5052040 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Important | Security Feature Bypass | 5052040 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Important | Security Feature Bypass | 5051974 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Important | Security Feature Bypass | 5051989 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Security Feature Bypass | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Security Feature Bypass | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Security Feature Bypass | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Important | Security Feature Bypass | 5052038 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Security Feature Bypass | 5052016 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Important | Security Feature Bypass | 5052016 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Important | Security Feature Bypass | 5052020 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Important | Security Feature Bypass | 5052020 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Important | Security Feature Bypass | 5052042 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Important | Security Feature Bypass | 5052042 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Important | Security Feature Bypass | 5052006 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Important | Security Feature Bypass | 5052000 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051979 5052106 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) 5053638 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051979 5052106 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3328 10.0.20348.3270 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Important | Security Feature Bypass | 5051980 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) 5053636 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5051987 5052105 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3476 10.0.26100.3403 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26633 | Aliakbar Zahravi with Trend Micro |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26643
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Executive Summary: The UI performs the wrong action in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L), and availability (A:N). What does that mean for this vulnerability? Successful exploitation of this vulnerability has limited impacts to Confidentiality and Integrity and no impact on Availability. An attacker would need to combine this vulnerability with other vulnerabilities to perform an attack. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the permissions dialog feature prompt presented to users when initiating a download. Mitigations: None Workarounds: None Revision: 1.0    07-Mar-25     Information published. |
Low | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26643 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Low | Spoofing | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
134.0.3124.51 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-26643 | Farras Givari with Meta4sec Ahmed ElMasry Om Apip with ITSEC Asia canalun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26645
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client. Mitigations: None Workarounds: None Revision: 1.0    11-Mar-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26645 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Remote Desktop client for Windows Desktop | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2.6017.0 |
Maybe | None | |
Windows 10 for 32-bit Systems | 5053618 (Security Update) | Critical | Remote Code Execution | 5052040 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 for x64-based Systems | 5053618 (Security Update) | Critical | Remote Code Execution | 5052040 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20947 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5608 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5053606 (Security Update) | Critical | Remote Code Execution | 5051974 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5608 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5039 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5053602 (Security Update) | Critical | Remote Code Execution | 5051989 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5039 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5053598 (Security Update) | Critical | Remote Code Execution | 5051987 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5053598 (Security Update) | Critical | Remote Code Execution | 5051987 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 |
Yes | None |
Windows App Client for Windows Desktop | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.0.365.0 |
Maybe | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5053888 (Monthly Rollup) 5053995 (Security Only) |
Critical | Remote Code Execution | 5052038 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23168 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Critical | Remote Code Execution | 5052016 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5053620 (Monthly Rollup) 5053627 (Security Only) |
Critical | Remote Code Execution | 5052016 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27618 |
Yes | None |
Windows Server 2012 | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5053886 (Monthly Rollup) | Critical | Remote Code Execution | 5052020 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25368 |
Yes | None |
Windows Server 2012 R2 | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5053887 (Monthly Rollup) | Critical | Remote Code Execution | 5052042 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22470 |
Yes | None |
Windows Server 2016 | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5053594 (Security Update) | Critical | Remote Code Execution | 5052006 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7876 |
Yes | None |
Windows Server 2019 | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5053596 (Security Update) | Critical | Remote Code Execution | 5052000 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7009 |
Yes | None |
Windows Server 2022 | 5053603 (Security Update) | Critical | Remote Code Execution | 5051979 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5053603 (Security Update) | Critical | Remote Code Execution | 5051979 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5053599 (Security Update) | Critical | Remote Code Execution | 5051980 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
Windows Server 2025 | 5053598 (Security Update) | Critical | Remote Code Execution | 5051987 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5053598 (Security Update) | Critical | Remote Code Execution | 5051987 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3476 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26645 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-3672
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.6/TemporalScore:5.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    27-Nov-21     Information published. 1.1    27-Feb-25     Added c-ares to CBL-Mariner 1.0 1.2    28-Feb-25     Added c-ares to CBL-Mariner 1.0 1.3    01-Mar-25     Added c-ares to CBL-Mariner 1.0 1.4    02-Mar-25     Added c-ares to CBL-Mariner 1.0 1.5    03-Mar-25     Added c-ares to CBL-Mariner 1.0 1.6    04-Mar-25     Added c-ares to CBL-Mariner 1.0 1.7    05-Mar-25     Added c-ares to CBL-Mariner 1.0 1.8    06-Mar-25     Added c-ares to CBL-Mariner 1.0 1.9    08-Mar-25     Added c-ares to CBL-Mariner 1.0 2.0    09-Mar-25     Added c-ares to CBL-Mariner 1.0 2.1    10-Mar-25     Added c-ares to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-3672 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 5.6 Temporal: 5.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 5.6 Temporal: 5.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | c-ares (CBL-Mariner) | Unknown | Unknown | Base: 5.6 Temporal: 5.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L |
1.18.1-1 |
Unknown | None | |
CBL Mariner 1.0 x64 | c-ares (CBL-Mariner) | Unknown | Unknown | Base: 5.6 Temporal: 5.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L |
1.18.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-3672 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-23336
MITRE NVD Issuing CNA: report@snyk.io |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    27-Feb-21     Information published. 1.6    30-Jun-24     Information published. 1.7    08-Jul-24     Information published. 1.8    09-Jul-24     Information published. 1.9    10-Jul-24     Information published. 2.0    12-Jul-24     Information published. 2.1    13-Jul-24     Information published. 2.2    14-Jul-24     Information published. 2.3    15-Jul-24     Information published. 2.4    16-Jul-24     Information published. 2.5    17-Jul-24     Information published. 2.6    19-Jul-24     Information published. 2.7    20-Jul-24     Information published. 2.8    21-Jul-24     Information published. 2.9    22-Jul-24     Information published. 3.0    23-Jul-24     Information published. 3.1    24-Jul-24     Information published. 3.2    25-Jul-24     Information published. 3.3    26-Jul-24     Information published. 3.4    27-Jul-24     Information published. 3.5    28-Jul-24     Information published. 3.6    29-Jul-24     Information published. 3.7    02-Aug-24     Information published. 3.8    03-Aug-24     Information published. 3.9    04-Aug-24     Information published. 4.0    05-Aug-24     Information published. 4.1    06-Aug-24     Information published. 4.2    07-Aug-24     Information published. 4.3    08-Aug-24     Information published. 4.4    09-Aug-24     Information published. 4.5    10-Aug-24     Information published. 4.6    11-Aug-24     Information published. 4.7    12-Aug-24     Information published. 4.8    15-Aug-24     Information published. 4.9    16-Aug-24     Information published. 5.0    17-Aug-24     Information published. 5.1    18-Aug-24     Information published. 5.2    19-Aug-24     Information published. 5.3    20-Aug-24     Information published. 5.4    21-Aug-24     Information published. 5.5    22-Aug-24     Information published. 5.6    23-Aug-24     Information published. 5.7    24-Aug-24     Information published. 5.8    25-Aug-24     Information published. 5.9    26-Aug-24     Information published. 6.0    27-Aug-24     Information published. 6.1    28-Aug-24     Information published. 6.2    29-Aug-24     Information published. 6.3    30-Aug-24     Information published. 6.4    31-Aug-24     Information published. 6.5    01-Sep-24     Information published. 6.6    02-Sep-24     Information published. 6.7    03-Sep-24     Information published. 6.8    05-Sep-24     Information published. 6.9    06-Sep-24     Information published. 7.0    07-Sep-24     Information published. 7.1    08-Sep-24     Information published. 7.2    11-Sep-24     Information published. 7.3    12-Sep-24     Information published. 7.4    13-Sep-24     Information published. 7.5    14-Sep-24     Information published. 7.6    15-Sep-24     Information published. 7.7    16-Sep-24     Information published. 7.8    17-Sep-24     Information published. 7.9    18-Sep-24     Information published. 8.0    19-Sep-24     Information published. 8.1    20-Sep-24     Information published. 8.2    21-Sep-24     Information published. 8.3    22-Sep-24     Information published. 8.4    23-Sep-24     Information published. 8.5    24-Sep-24     Information published. 8.6    25-Sep-24     Information published. 8.7    26-Sep-24     Information published. 8.8    27-Sep-24     Information published. 8.9    28-Sep-24     Information published. 9.0    29-Sep-24     Information published. 9.1    30-Sep-24     Information published. 9.2    01-Oct-24     Information published. 9.3    02-Oct-24     Information published. 9.4    03-Oct-24     Information published. 9.5    04-Oct-24     Information published. 9.6    05-Oct-24     Information published. 9.7    06-Oct-24     Information published. 9.8    07-Oct-24     Information published. 9.9    08-Oct-24     Information published. 10.0    09-Oct-24     Information published. 10.1    10-Oct-24     Information published. 10.2    11-Oct-24     Information published. 10.3    12-Oct-24     Information published. 10.4    13-Oct-24     Information published. 10.5    14-Oct-24     Information published. 10.6    15-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 10.7    16-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 10.8    17-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 10.9    18-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.0    19-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.1    20-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.2    21-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.3    22-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.4    23-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.5    24-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.6    25-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.7    26-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.8    27-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 11.9    28-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.0    29-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.1    30-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.2    31-Oct-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.3    01-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.4    02-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.5    04-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.6    05-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.7    06-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.8    07-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 12.9    08-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.0    09-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.1    10-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.2    11-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.3    12-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.4    13-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.5    14-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.6    15-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.7    16-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.8    17-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 13.9    18-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.0    19-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.1    20-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.2    21-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.3    23-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.4    24-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.5    25-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.6    26-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.7    27-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.8    28-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 14.9    29-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.0    30-Nov-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.1    01-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.2    02-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.3    03-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.4    04-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.5    05-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.6    07-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.7    08-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.8    09-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 15.9    10-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.0    11-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.1    12-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.2    13-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.3    14-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.4    15-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.5    16-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.6    17-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.7    18-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.8    19-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 16.9    20-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.0    21-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.1    22-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.2    23-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.3    24-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.4    25-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.5    26-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.6    27-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.7    28-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.8    29-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 17.9    30-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.0    31-Dec-24     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.1    01-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.2    02-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.3    03-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.4    04-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.5    05-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.6    06-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.7    07-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.8    08-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 18.9    09-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.0    10-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.1    11-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.2    12-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.3    13-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.4    15-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.5    16-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.6    17-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.7    18-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.8    19-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 19.9    20-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.0    21-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.1    22-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.2    23-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.3    24-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.4    25-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.5    27-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.6    28-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.7    29-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.8    30-Jan-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 20.9    01-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.0    02-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.1    03-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.2    04-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.3    05-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.4    07-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.5    08-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.6    09-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.7    10-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.8    11-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 21.9    12-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.0    13-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.1    14-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.2    15-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.3    16-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.4    17-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.5    18-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.6    19-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.7    20-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.8    21-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 22.9    22-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.0    23-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.1    24-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.2    25-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.3    26-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.4    27-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.5    28-Feb-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.6    01-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.7    02-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.8    03-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 23.9    04-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 24.0    05-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 24.1    06-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 24.2    08-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 24.3    09-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 24.4    10-Mar-25     Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-23336 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
2.7.18-6 3.7.10-3 |
None | ||
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
2.7.18-6 3.7.10-3 |
None | ||
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-23336 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-40548
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Sep-24     Information published. 1.1    07-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.2    08-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.3    09-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.4    10-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.5    11-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.6    12-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.7    13-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.8    14-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.9    15-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.0    16-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.1    17-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.2    18-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.3    19-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.4    20-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.5    21-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.6    22-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.7    23-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.8    24-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.9    25-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.0    26-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.1    27-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.2    28-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.3    29-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.4    30-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.5    31-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.6    01-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.7    02-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.8    03-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.9    04-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.0    05-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.1    06-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.2    07-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.3    08-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.4    09-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.5    10-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.6    11-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.7    12-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.8    13-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.9    15-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.0    16-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.1    17-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.2    18-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.3    19-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.4    20-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.5    21-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.6    22-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.7    23-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.8    24-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.9    25-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.0    27-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.1    28-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.2    29-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.3    30-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.4    01-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.5    02-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.6    03-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.7    04-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.8    05-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.9    07-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.0    08-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.1    09-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.2    10-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.3    11-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.4    12-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.5    13-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.6    14-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.7    15-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.8    16-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.9    17-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.0    18-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.1    19-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.2    20-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.3    21-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.4    22-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.5    23-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.6    24-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.7    25-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.8    26-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.9    27-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.0    28-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.1    01-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.2    02-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.3    03-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.4    04-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.5    05-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.6    06-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.7    08-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.8    09-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.9    10-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-40548 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | shim (CBL-Mariner) shim-unsigned-aarch64 (CBL-Mariner) |
Unknown | Unknown | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
15.8-3 |
None | ||
Azure Linux 3.0 x64 | shim (CBL-Mariner) shim-unsigned-aarch64 (CBL-Mariner) |
Unknown | Unknown | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
15.8-3 |
None | ||
CBL Mariner 2.0 ARM | shim (CBL-Mariner) shim-unsigned-x64 (CBL-Mariner) |
Unknown | Unknown | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
15.8-1 |
None | ||
CBL Mariner 2.0 x64 | shim (CBL-Mariner) shim-unsigned-x64 (CBL-Mariner) |
Unknown | Unknown | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
15.8-1 |
None |
CVE ID | Acknowledgements |
CVE-2023-40548 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-40550
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Sep-24     Information published. 1.1    07-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.2    08-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.3    09-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.4    10-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.5    11-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.6    12-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.7    13-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.8    14-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 1.9    15-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.0    16-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.1    17-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.2    18-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.3    19-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.4    20-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.5    21-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.6    22-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.7    23-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.8    24-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 2.9    25-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.0    26-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.1    27-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.2    28-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.3    29-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.4    30-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.5    31-Dec-24     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.6    01-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.7    02-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.8    03-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 3.9    04-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.0    05-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.1    06-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.2    07-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.3    08-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.4    09-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.5    10-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.6    11-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.7    12-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.8    13-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 4.9    15-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.0    16-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.1    17-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.2    18-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.3    19-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.4    20-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.5    21-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.6    22-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.7    23-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.8    24-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 5.9    25-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.0    27-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.1    28-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.2    29-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.3    30-Jan-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.4    01-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.5    02-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.6    03-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.7    04-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.8    05-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 6.9    07-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.0    08-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.1    09-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.2    10-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.3    11-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.4    12-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.5    13-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.6    14-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.7    15-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.8    16-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 7.9    17-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.0    18-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.1    19-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.2    20-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.3    21-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.4    22-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.5    23-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.6    24-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.7    25-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.8    26-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 8.9    27-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.0    28-Feb-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.1    01-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.2    02-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.3    03-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.4    04-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.5    05-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.6    06-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.7    08-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.8    09-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 9.9    10-Mar-25     Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-40550 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | shim (CBL-Mariner) shim-unsigned-aarch64 (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
15.8-3 |
None | ||
Azure Linux 3.0 x64 | shim (CBL-Mariner) shim-unsigned-aarch64 (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
15.8-3 |
None | ||
CBL Mariner 2.0 ARM | shim (CBL-Mariner) shim-unsigned-x64 (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
15.8-1 |
None | ||
CBL Mariner 2.0 x64 | shim (CBL-Mariner) shim-unsigned-x64 (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
15.8-1 |
None |
CVE ID | Acknowledgements |
CVE-2023-40550 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2020-27840
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    15-Oct-24     Information published. 1.1    16-Oct-24     Added samba to Azure Linux 3.0 1.2    17-Oct-24     Added samba to Azure Linux 3.0 1.3    18-Oct-24     Added samba to Azure Linux 3.0 1.4    19-Oct-24     Added samba to Azure Linux 3.0 1.5    20-Oct-24     Added samba to Azure Linux 3.0 1.6    21-Oct-24     Added samba to Azure Linux 3.0 1.7    22-Oct-24     Added samba to Azure Linux 3.0 1.8    23-Oct-24     Added samba to Azure Linux 3.0 1.9    24-Oct-24     Added samba to Azure Linux 3.0 2.0    25-Oct-24     Added samba to Azure Linux 3.0 2.1    26-Oct-24     Added samba to Azure Linux 3.0 2.2    27-Oct-24     Added samba to Azure Linux 3.0 2.3    28-Oct-24     Added samba to Azure Linux 3.0 2.4    29-Oct-24     Added samba to Azure Linux 3.0 2.5    30-Oct-24     Added samba to Azure Linux 3.0 2.6    31-Oct-24     Added samba to Azure Linux 3.0 2.7    01-Nov-24     Added samba to Azure Linux 3.0 2.8    02-Nov-24     Added samba to Azure Linux 3.0 2.9    04-Nov-24     Added samba to Azure Linux 3.0 3.0    05-Nov-24     Added samba to Azure Linux 3.0 3.1    06-Nov-24     Added samba to Azure Linux 3.0 3.2    07-Nov-24     Added samba to Azure Linux 3.0 3.3    08-Nov-24     Added samba to Azure Linux 3.0 3.4    09-Nov-24     Added samba to Azure Linux 3.0 3.5    10-Nov-24     Added samba to Azure Linux 3.0 3.6    11-Nov-24     Added samba to Azure Linux 3.0 3.7    12-Nov-24     Added samba to Azure Linux 3.0 3.8    13-Nov-24     Added samba to Azure Linux 3.0 3.9    14-Nov-24     Added samba to Azure Linux 3.0 4.0    15-Nov-24     Added samba to Azure Linux 3.0 4.1    16-Nov-24     Added samba to Azure Linux 3.0 4.2    17-Nov-24     Added samba to Azure Linux 3.0 4.3    18-Nov-24     Added samba to Azure Linux 3.0 4.4    19-Nov-24     Added samba to Azure Linux 3.0 4.5    20-Nov-24     Added samba to Azure Linux 3.0 4.6    21-Nov-24     Added samba to Azure Linux 3.0 4.7    23-Nov-24     Added samba to Azure Linux 3.0 4.8    24-Nov-24     Added samba to Azure Linux 3.0 4.9    25-Nov-24     Added samba to Azure Linux 3.0 5.0    26-Nov-24     Added samba to Azure Linux 3.0 5.1    27-Nov-24     Added samba to Azure Linux 3.0 5.2    28-Nov-24     Added samba to Azure Linux 3.0 5.3    29-Nov-24     Added samba to Azure Linux 3.0 5.4    30-Nov-24     Added samba to Azure Linux 3.0 5.5    01-Dec-24     Added samba to Azure Linux 3.0 5.6    02-Dec-24     Added samba to Azure Linux 3.0 5.7    03-Dec-24     Added samba to Azure Linux 3.0 5.8    04-Dec-24     Added samba to Azure Linux 3.0 5.9    05-Dec-24     Added samba to Azure Linux 3.0 6.0    07-Dec-24     Added samba to Azure Linux 3.0 6.1    08-Dec-24     Added samba to Azure Linux 3.0 6.2    09-Dec-24     Added samba to Azure Linux 3.0 6.3    10-Dec-24     Added samba to Azure Linux 3.0 6.4    11-Dec-24     Added samba to Azure Linux 3.0 6.5    12-Dec-24     Added samba to Azure Linux 3.0 6.6    13-Dec-24     Added samba to Azure Linux 3.0 6.7    14-Dec-24     Added samba to Azure Linux 3.0 6.8    15-Dec-24     Added samba to Azure Linux 3.0 6.9    16-Dec-24     Added samba to Azure Linux 3.0 7.0    17-Dec-24     Added samba to Azure Linux 3.0 7.1    18-Dec-24     Added samba to Azure Linux 3.0 7.2    19-Dec-24     Added samba to Azure Linux 3.0 7.3    20-Dec-24     Added samba to Azure Linux 3.0 7.4    21-Dec-24     Added samba to Azure Linux 3.0 7.5    22-Dec-24     Added samba to Azure Linux 3.0 7.6    23-Dec-24     Added samba to Azure Linux 3.0 7.7    24-Dec-24     Added samba to Azure Linux 3.0 7.8    25-Dec-24     Added samba to Azure Linux 3.0 7.9    26-Dec-24     Added samba to Azure Linux 3.0 8.0    27-Dec-24     Added samba to Azure Linux 3.0 8.1    28-Dec-24     Added samba to Azure Linux 3.0 8.2    29-Dec-24     Added samba to Azure Linux 3.0 8.3    30-Dec-24     Added samba to Azure Linux 3.0 8.4    31-Dec-24     Added samba to Azure Linux 3.0 8.5    01-Jan-25     Added samba to Azure Linux 3.0 8.6    02-Jan-25     Added samba to Azure Linux 3.0 8.7    03-Jan-25     Added samba to Azure Linux 3.0 8.8    04-Jan-25     Added samba to Azure Linux 3.0 8.9    05-Jan-25     Added samba to Azure Linux 3.0 9.0    06-Jan-25     Added samba to Azure Linux 3.0 9.1    07-Jan-25     Added samba to Azure Linux 3.0 9.2    08-Jan-25     Added samba to Azure Linux 3.0 9.3    09-Jan-25     Added samba to Azure Linux 3.0 9.4    10-Jan-25     Added samba to Azure Linux 3.0 9.5    11-Jan-25     Added samba to Azure Linux 3.0 9.6    12-Jan-25     Added samba to Azure Linux 3.0 9.7    13-Jan-25     Added samba to Azure Linux 3.0 9.8    15-Jan-25     Added samba to Azure Linux 3.0 9.9    16-Jan-25     Added samba to Azure Linux 3.0 10.0    17-Jan-25     Added samba to Azure Linux 3.0 10.1    18-Jan-25     Added samba to Azure Linux 3.0 10.2    19-Jan-25     Added samba to Azure Linux 3.0 10.3    20-Jan-25     Added samba to Azure Linux 3.0 10.4    21-Jan-25     Added samba to Azure Linux 3.0 10.5    22-Jan-25     Added samba to Azure Linux 3.0 10.6    23-Jan-25     Added samba to Azure Linux 3.0 10.7    24-Jan-25     Added samba to Azure Linux 3.0 10.8    25-Jan-25     Added samba to Azure Linux 3.0 10.9    27-Jan-25     Added samba to Azure Linux 3.0 11.0    28-Jan-25     Added samba to Azure Linux 3.0 11.1    29-Jan-25     Added samba to Azure Linux 3.0 11.2    30-Jan-25     Added samba to Azure Linux 3.0 11.3    01-Feb-25     Added samba to Azure Linux 3.0 11.4    02-Feb-25     Added samba to Azure Linux 3.0 11.5    03-Feb-25     Added samba to Azure Linux 3.0 11.6    04-Feb-25     Added samba to Azure Linux 3.0 11.7    05-Feb-25     Added samba to Azure Linux 3.0 11.8    07-Feb-25     Added samba to Azure Linux 3.0 11.9    08-Feb-25     Added samba to Azure Linux 3.0 12.0    09-Feb-25     Added samba to Azure Linux 3.0 12.1    10-Feb-25     Added samba to Azure Linux 3.0 12.2    11-Feb-25     Added samba to Azure Linux 3.0 12.3    12-Feb-25     Added samba to Azure Linux 3.0 12.4    13-Feb-25     Added samba to Azure Linux 3.0 12.5    14-Feb-25     Added samba to Azure Linux 3.0 12.6    15-Feb-25     Added samba to Azure Linux 3.0 12.7    16-Feb-25     Added samba to Azure Linux 3.0 12.8    17-Feb-25     Added samba to Azure Linux 3.0 12.9    18-Feb-25     Added samba to Azure Linux 3.0 13.0    19-Feb-25     Added samba to Azure Linux 3.0 13.1    20-Feb-25     Added samba to Azure Linux 3.0 13.2    21-Feb-25     Added samba to Azure Linux 3.0 13.3    22-Feb-25     Added samba to Azure Linux 3.0 13.4    23-Feb-25     Added samba to Azure Linux 3.0 13.5    24-Feb-25     Added samba to Azure Linux 3.0 13.6    25-Feb-25     Added samba to Azure Linux 3.0 13.7    26-Feb-25     Added samba to Azure Linux 3.0 13.8    27-Feb-25     Added samba to Azure Linux 3.0 13.9    28-Feb-25     Added samba to Azure Linux 3.0 14.0    01-Mar-25     Added samba to Azure Linux 3.0 14.1    02-Mar-25     Added samba to Azure Linux 3.0 14.2    03-Mar-25     Added samba to Azure Linux 3.0 14.3    04-Mar-25     Added samba to Azure Linux 3.0 14.4    05-Mar-25     Added samba to Azure Linux 3.0 14.5    06-Mar-25     Added samba to Azure Linux 3.0 14.6    08-Mar-25     Added samba to Azure Linux 3.0 14.7    09-Mar-25     Added samba to Azure Linux 3.0 14.8    10-Mar-25     Added samba to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2020-27840 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | samba (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
4.18.3-1 |
Unknown | None | |
Azure Linux 3.0 x64 | samba (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
4.18.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2020-27840 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-5288
MITRE NVD Issuing CNA: facts@wolfssl.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Dec-24     Information published. 1.1    12-Dec-24     Added mariadb to CBL-Mariner 2.0 Added mariadb to Azure Linux 3.0 1.2    01-Mar-25     Added mariadb to CBL-Mariner 2.0 Added mariadb to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-5288 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | mariadb (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
10.11.10-1 |
Unknown | None | |
Azure Linux 3.0 x64 | mariadb (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
10.11.10-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | mariadb (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
10.6.20-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mariadb (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
10.6.20-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-5288 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-6104
MITRE NVD Issuing CNA: security@hashicorp.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.1    15-Aug-24     Information published. 1.2    16-Aug-24     Information published. 1.3    17-Aug-24     Information published. 1.4    18-Aug-24     Information published. 1.5    19-Aug-24     Information published. 1.6    20-Aug-24     Information published. 1.7    21-Aug-24     Information published. 1.8    22-Aug-24     Information published. 1.9    23-Aug-24     Information published. 2.0    24-Aug-24     Information published. 2.1    25-Aug-24     Information published. 2.2    26-Aug-24     Information published. 2.3    27-Aug-24     Information published. 2.4    28-Aug-24     Information published. 2.5    29-Aug-24     Information published. 2.6    30-Aug-24     Information published. 2.7    31-Aug-24     Information published. 2.8    01-Sep-24     Information published. 2.9    02-Sep-24     Information published. 3.0    03-Sep-24     Information published. 3.1    05-Sep-24     Information published. 3.2    06-Sep-24     Information published. 3.3    07-Sep-24     Information published. 3.4    08-Sep-24     Information published. 3.5    11-Sep-24     Information published. 3.6    13-Sep-24     Information published. 3.7    14-Sep-24     Information published. 3.8    15-Sep-24     Information published. 3.9    16-Sep-24     Information published. 4.0    17-Sep-24     Information published. 4.1    18-Sep-24     Information published. 4.2    19-Sep-24     Information published. 4.3    20-Sep-24     Information published. 4.4    21-Sep-24     Information published. 4.5    22-Sep-24     Information published. 4.6    23-Sep-24     Information published. 4.7    24-Sep-24     Information published. 4.8    25-Sep-24     Information published. 4.9    26-Sep-24     Information published. 5.0    27-Sep-24     Information published. 5.1    28-Sep-24     Information published. 5.2    29-Sep-24     Information published. 5.3    30-Sep-24     Information published. 5.4    01-Oct-24     Information published. 5.5    02-Oct-24     Information published. 5.6    03-Oct-24     Information published. 5.7    04-Oct-24     Information published. 5.8    05-Oct-24     Information published. 5.9    06-Oct-24     Information published. 6.0    07-Oct-24     Information published. 6.1    08-Oct-24     Information published. 6.2    09-Oct-24     Information published. 6.3    11-Oct-24     Information published. 6.4    12-Oct-24     Information published. 6.5    13-Oct-24     Information published. 6.6    14-Oct-24     Information published. 6.7    15-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 6.8    16-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 6.9    17-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.0    18-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.1    19-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.2    20-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.3    21-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.4    22-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.5    23-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.6    24-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.7    25-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.8    26-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 7.9    27-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.0    28-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.1    29-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.2    30-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.3    31-Oct-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.4    01-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.5    02-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.6    04-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.7    05-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.8    06-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 8.9    07-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.0    08-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.1    09-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.2    10-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.3    11-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.4    12-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.5    13-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.6    14-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.7    15-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.8    16-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 9.9    17-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.0    18-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.1    19-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.2    20-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.3    21-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.4    23-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.5    24-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.6    25-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.7    26-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.8    27-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 10.9    28-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.0    29-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.1    30-Nov-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.2    01-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.3    02-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.4    03-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.5    04-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.6    05-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.7    07-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.8    08-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 11.9    09-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.0    10-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.1    11-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.2    12-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.3    13-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.4    14-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.5    15-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.6    16-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.7    17-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.8    18-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 12.9    19-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.0    20-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.1    21-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.2    22-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.3    23-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.4    24-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.5    25-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.6    26-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.7    27-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.8    28-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 13.9    29-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.0    30-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.1    31-Dec-24     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.2    01-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.3    02-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.4    03-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.5    04-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.6    05-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.7    06-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.8    07-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 14.9    08-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.0    09-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.1    10-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.2    11-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.3    12-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.4    13-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.5    15-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.6    16-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.7    17-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.8    18-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 15.9    19-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.0    20-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.1    21-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.2    22-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.3    23-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.4    24-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.5    25-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.6    27-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.7    28-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.8    29-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 16.9    30-Jan-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.0    01-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.1    02-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.2    03-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.3    04-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.4    05-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.5    07-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.6    08-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.7    09-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.8    10-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 17.9    11-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.0    12-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.1    13-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.2    14-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.3    15-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.4    16-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.5    17-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.6    18-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.7    19-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.8    20-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 18.9    21-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.0    22-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.1    23-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.2    24-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.3    25-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.4    26-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.5    27-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.6    28-Feb-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.7    01-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.8    02-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 19.9    03-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 20.0    04-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 20.1    05-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 20.2    06-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 20.3    08-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 20.4    09-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 20.5    10-Mar-25     Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-6104 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | libcontainers-common (CBL-Mariner) cert-manager (CBL-Mariner) influxdb (CBL-Mariner) keda (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
20240213-2 1.12.12-3 2.7.3-5 2.14.0-2 |
None | ||
Azure Linux 3.0 x64 | cert-manager (CBL-Mariner) influxdb (CBL-Mariner) keda (CBL-Mariner) libcontainers-common (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.12.12-3 2.7.3-5 2.14.0-2 20240213-2 |
None | ||
CBL Mariner 2.0 ARM | cert-manager (CBL-Mariner) influxdb (CBL-Mariner) keda (CBL-Mariner) packer (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.11.2-12 2.6.1-15 2.4.0-22 1.9.5-2 |
None | ||
CBL Mariner 2.0 x64 | cert-manager (CBL-Mariner) influxdb (CBL-Mariner) keda (CBL-Mariner) packer (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.11.2-12 2.6.1-15 2.4.0-22 1.9.5-2 |
None |
CVE ID | Acknowledgements |
CVE-2024-6104 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-45288
MITRE NVD Issuing CNA: security@golang.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-24     Information published. 1.1    20-Apr-24     Information published. 1.2    30-Jun-24     Information published. 1.3    02-Jul-24     Information published. 1.4    12-Jul-24     Information published. 1.5    07-Aug-24     Information published. 1.6    08-Aug-24     Information published. 1.7    09-Aug-24     Information published. 1.8    10-Aug-24     Information published. 1.9    11-Aug-24     Information published. 2.0    12-Aug-24     Information published. 2.1    15-Aug-24     Information published. 2.2    16-Aug-24     Information published. 2.3    17-Aug-24     Information published. 2.4    18-Aug-24     Information published. 2.5    19-Aug-24     Information published. 2.6    20-Aug-24     Information published. 2.7    21-Aug-24     Information published. 2.8    22-Aug-24     Information published. 2.9    23-Aug-24     Information published. 3.0    24-Aug-24     Information published. 3.1    25-Aug-24     Information published. 3.2    26-Aug-24     Information published. 3.3    11-Sep-24     Information published. 3.4    13-Sep-24     Information published. 3.5    14-Sep-24     Information published. 3.6    15-Sep-24     Information published. 3.7    16-Sep-24     Information published. 3.8    17-Sep-24     Information published. 3.9    18-Sep-24     Information published. 4.0    19-Sep-24     Information published. 4.1    20-Sep-24     Information published. 4.2    21-Sep-24     Information published. 4.3    22-Sep-24     Information published. 4.4    23-Sep-24     Information published. 4.5    24-Sep-24     Information published. 4.6    25-Sep-24     Information published. 4.7    26-Sep-24     Information published. 4.8    27-Sep-24     Information published. 4.9    28-Sep-24     Information published. 5.0    29-Sep-24     Information published. 5.1    30-Sep-24     Information published. 5.2    01-Oct-24     Information published. 5.3    02-Oct-24     Information published. 5.4    03-Oct-24     Information published. 5.5    04-Oct-24     Information published. 5.6    05-Oct-24     Information published. 5.7    06-Oct-24     Information published. 5.8    07-Oct-24     Information published. 5.9    09-Oct-24     Information published. 6.0    10-Oct-24     Information published. 6.1    11-Oct-24     Information published. 6.2    12-Oct-24     Information published. 6.3    13-Oct-24     Information published. 6.4    14-Oct-24     Information published. 6.5    15-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 6.6    16-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 6.7    17-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 6.8    18-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 6.9    19-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.0    20-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.1    21-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.2    22-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.3    23-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.4    24-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.5    25-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.6    26-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.7    27-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.8    28-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 7.9    29-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.0    30-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.1    31-Oct-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.2    01-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.3    02-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.4    04-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.5    05-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.6    06-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.7    07-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.8    08-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 8.9    09-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.0    10-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.1    11-Nov-24     Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.2    12-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.3    13-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.4    14-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.5    15-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.6    16-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.7    17-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.8    18-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 9.9    19-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.0    20-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.1    21-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.2    23-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.3    24-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.4    25-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.5    26-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.6    27-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.7    28-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.8    29-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 10.9    30-Nov-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.0    01-Dec-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.1    02-Dec-24     Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.2    03-Dec-24     Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.3    04-Dec-24     Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.4    05-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.5    07-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.6    08-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.7    09-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.8    10-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 11.9    11-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.0    12-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.1    13-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.2    14-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.3    15-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.4    16-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.5    17-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.6    18-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.7    19-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.8    20-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 12.9    21-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.0    22-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.1    23-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.2    24-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.3    25-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.4    26-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.5    27-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.6    28-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.7    29-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.8    30-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 13.9    31-Dec-24     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.0    01-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.1    02-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.2    03-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.3    04-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.4    05-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.5    06-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.6    07-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.7    08-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.8    09-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 14.9    10-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.0    11-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.1    12-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.2    13-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.3    15-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.4    16-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.5    17-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.6    18-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.7    19-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.8    20-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 15.9    21-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.0    22-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.1    23-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.2    24-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.3    25-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.4    27-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.5    28-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.6    29-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.7    30-Jan-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.8    01-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 16.9    02-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.0    03-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.1    04-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.2    05-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.3    07-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.4    08-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.5    09-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.6    10-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.7    11-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.8    12-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 17.9    13-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.0    15-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.1    16-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.2    17-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.3    18-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.4    19-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.5    20-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.6    21-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.7    22-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.8    23-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 18.9    24-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.0    25-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.1    26-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.2    27-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.3    28-Feb-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.4    01-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.5    02-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.6    03-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.7    04-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.8    05-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 19.9    06-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 20.0    08-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 20.1    09-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 20.2    10-Mar-25     Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-45288 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | application-gateway-kubernetes-ingress (CBL-Mariner) azcopy (CBL-Mariner) blobfuse2 (CBL-Mariner) cert-manager (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
1.7.7-1 10.25.1-1 2.3.0-1 1.12.12-1 |
None | ||
Azure Linux 3.0 x64 | application-gateway-kubernetes-ingress (CBL-Mariner) azcopy (CBL-Mariner) blobfuse2 (CBL-Mariner) cert-manager (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
1.7.7-1 10.25.1-1 2.3.0-1 1.12.12-1 |
None | ||
CBL Mariner 2.0 ARM | azcopy (CBL-Mariner) blobfuse2 (CBL-Mariner) cert-manager (CBL-Mariner) coredns (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
10.25.1-1 2.1.2-3 1.11.2-9 1.11.1-8 |
None | ||
CBL Mariner 2.0 x64 | azcopy (CBL-Mariner) blobfuse2 (CBL-Mariner) cert-manager (CBL-Mariner) coredns (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
10.25.1-1 2.1.2-3 1.11.2-9 1.11.1-8 |
None |
CVE ID | Acknowledgements |
CVE-2023-45288 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-20907
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Aug-20     Information published. 1.6    30-Jun-24     Information published. 1.7    08-Jul-24     Information published. 1.8    09-Jul-24     Information published. 1.9    10-Jul-24     Information published. 2.0    12-Jul-24     Information published. 2.1    13-Jul-24     Information published. 2.2    14-Jul-24     Information published. 2.3    15-Jul-24     Information published. 2.4    16-Jul-24     Information published. 2.5    17-Jul-24     Information published. 2.6    19-Jul-24     Information published. 2.7    20-Jul-24     Information published. 2.8    21-Jul-24     Information published. 2.9    22-Jul-24     Information published. 3.0    23-Jul-24     Information published. 3.1    24-Jul-24     Information published. 3.2    25-Jul-24     Information published. 3.3    26-Jul-24     Information published. 3.4    27-Jul-24     Information published. 3.5    28-Jul-24     Information published. 3.6    29-Jul-24     Information published. 3.7    02-Aug-24     Information published. 3.8    03-Aug-24     Information published. 3.9    04-Aug-24     Information published. 4.0    05-Aug-24     Information published. 4.1    06-Aug-24     Information published. 4.2    07-Aug-24     Information published. 4.3    08-Aug-24     Information published. 4.4    09-Aug-24     Information published. 4.5    10-Aug-24     Information published. 4.6    11-Aug-24     Information published. 4.7    12-Aug-24     Information published. 4.8    15-Aug-24     Information published. 4.9    16-Aug-24     Information published. 5.0    17-Aug-24     Information published. 5.1    18-Aug-24     Information published. 5.2    19-Aug-24     Information published. 5.3    20-Aug-24     Information published. 5.4    21-Aug-24     Information published. 5.5    22-Aug-24     Information published. 5.6    23-Aug-24     Information published. 5.7    24-Aug-24     Information published. 5.8    25-Aug-24     Information published. 5.9    26-Aug-24     Information published. 6.0    27-Aug-24     Information published. 6.1    28-Aug-24     Information published. 6.2    29-Aug-24     Information published. 6.3    30-Aug-24     Information published. 6.4    31-Aug-24     Information published. 6.5    01-Sep-24     Information published. 6.6    02-Sep-24     Information published. 6.7    03-Sep-24     Information published. 6.8    05-Sep-24     Information published. 6.9    06-Sep-24     Information published. 7.0    07-Sep-24     Information published. 7.1    08-Sep-24     Information published. 7.2    11-Sep-24     Information published. 7.3    12-Sep-24     Information published. 7.4    13-Sep-24     Information published. 7.5    14-Sep-24     Information published. 7.6    15-Sep-24     Information published. 7.7    16-Sep-24     Information published. 7.8    17-Sep-24     Information published. 7.9    18-Sep-24     Information published. 8.0    19-Sep-24     Information published. 8.1    20-Sep-24     Information published. 8.2    21-Sep-24     Information published. 8.3    22-Sep-24     Information published. 8.4    23-Sep-24     Information published. 8.5    24-Sep-24     Information published. 8.6    25-Sep-24     Information published. 8.7    26-Sep-24     Information published. 8.8    27-Sep-24     Information published. 8.9    28-Sep-24     Information published. 9.0    29-Sep-24     Information published. 9.1    30-Sep-24     Information published. 9.2    01-Oct-24     Information published. 9.3    02-Oct-24     Information published. 9.4    03-Oct-24     Information published. 9.5    04-Oct-24     Information published. 9.6    05-Oct-24     Information published. 9.7    06-Oct-24     Information published. 9.8    07-Oct-24     Information published. 9.9    08-Oct-24     Information published. 10.0    09-Oct-24     Information published. 10.1    10-Oct-24     Information published. 10.2    11-Oct-24     Information published. 10.3    12-Oct-24     Information published. 10.4    13-Oct-24     Information published. 10.5    14-Oct-24     Information published. 10.6    15-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 10.7    16-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 10.8    17-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 10.9    18-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.0    19-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.1    20-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.2    21-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.3    22-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.4    23-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.5    24-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.6    25-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.7    26-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.8    27-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 11.9    28-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.0    29-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.1    30-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.2    31-Oct-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.3    01-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.4    02-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.5    04-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.6    05-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.7    06-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.8    07-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 12.9    08-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.0    09-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.1    10-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.2    11-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.3    12-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.4    13-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.5    14-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.6    15-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.7    16-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.8    17-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 13.9    18-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.0    19-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.1    20-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.2    21-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.3    23-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.4    24-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.5    25-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.6    26-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.7    27-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.8    28-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 14.9    29-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.0    30-Nov-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.1    01-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.2    02-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.3    03-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.4    04-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.5    05-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.6    07-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.7    08-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.8    09-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 15.9    10-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.0    11-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.1    12-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.2    13-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.3    14-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.4    15-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.5    16-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.6    17-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.7    18-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.8    19-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 16.9    20-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.0    21-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.1    22-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.2    23-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.3    24-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.4    25-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.5    26-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.6    27-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.7    28-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.8    29-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 17.9    30-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.0    31-Dec-24     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.1    01-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.2    02-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.3    03-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.4    04-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.5    05-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.6    06-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.7    07-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.8    08-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 18.9    09-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.0    10-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.1    11-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.2    12-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.3    13-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.4    15-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.5    16-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.6    17-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.7    18-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.8    19-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 19.9    20-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.0    21-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.1    22-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.2    23-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.3    24-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.4    25-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.5    27-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.6    28-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.7    29-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.8    30-Jan-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 20.9    01-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.0    02-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.1    03-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.2    04-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.3    05-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.4    07-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.5    08-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.6    09-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.7    10-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.8    11-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 21.9    12-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.0    13-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.1    14-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.2    15-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.3    16-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.4    17-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.5    18-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.6    19-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.7    20-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.8    21-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 22.9    22-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.0    23-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.1    24-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.2    25-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.3    26-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.4    27-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.5    28-Feb-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.6    01-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.7    02-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.8    03-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 23.9    04-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 24.0    05-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 24.1    06-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 24.2    08-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 24.3    09-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 24.4    10-Mar-25     Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-20907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 3.7.10-3 |
None | ||
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 3.7.10-3 |
None | ||
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-20907 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-9674
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Aug-20     Information published. 1.6    30-Jun-24     Information published. 1.7    08-Jul-24     Information published. 1.8    09-Jul-24     Information published. 1.9    10-Jul-24     Information published. 2.0    12-Jul-24     Information published. 2.1    13-Jul-24     Information published. 2.2    14-Jul-24     Information published. 2.3    15-Jul-24     Information published. 2.4    16-Jul-24     Information published. 2.5    17-Jul-24     Information published. 2.6    19-Jul-24     Information published. 2.7    20-Jul-24     Information published. 2.8    21-Jul-24     Information published. 2.9    22-Jul-24     Information published. 3.0    23-Jul-24     Information published. 3.1    24-Jul-24     Information published. 3.2    25-Jul-24     Information published. 3.3    26-Jul-24     Information published. 3.4    27-Jul-24     Information published. 3.5    28-Jul-24     Information published. 3.6    29-Jul-24     Information published. 3.7    02-Aug-24     Information published. 3.8    03-Aug-24     Information published. 3.9    04-Aug-24     Information published. 4.0    05-Aug-24     Information published. 4.1    06-Aug-24     Information published. 4.2    07-Aug-24     Information published. 4.3    08-Aug-24     Information published. 4.4    09-Aug-24     Information published. 4.5    10-Aug-24     Information published. 4.6    11-Aug-24     Information published. 4.7    12-Aug-24     Information published. 4.8    15-Aug-24     Information published. 4.9    16-Aug-24     Information published. 5.0    17-Aug-24     Information published. 5.1    18-Aug-24     Information published. 5.2    19-Aug-24     Information published. 5.3    20-Aug-24     Information published. 5.4    21-Aug-24     Information published. 5.5    22-Aug-24     Information published. 5.6    23-Aug-24     Information published. 5.7    24-Aug-24     Information published. 5.8    25-Aug-24     Information published. 5.9    26-Aug-24     Information published. 6.0    27-Aug-24     Information published. 6.1    28-Aug-24     Information published. 6.2    29-Aug-24     Information published. 6.3    30-Aug-24     Information published. 6.4    31-Aug-24     Information published. 6.5    01-Sep-24     Information published. 6.6    02-Sep-24     Information published. 6.7    03-Sep-24     Information published. 6.8    05-Sep-24     Information published. 6.9    06-Sep-24     Information published. 7.0    07-Sep-24     Information published. 7.1    08-Sep-24     Information published. 7.2    11-Sep-24     Information published. 7.3    12-Sep-24     Information published. 7.4    13-Sep-24     Information published. 7.5    14-Sep-24     Information published. 7.6    15-Sep-24     Information published. 7.7    16-Sep-24     Information published. 7.8    17-Sep-24     Information published. 7.9    18-Sep-24     Information published. 8.0    19-Sep-24     Information published. 8.1    20-Sep-24     Information published. 8.2    21-Sep-24     Information published. 8.3    22-Sep-24     Information published. 8.4    23-Sep-24     Information published. 8.5    24-Sep-24     Information published. 8.6    25-Sep-24     Information published. 8.7    26-Sep-24     Information published. 8.8    27-Sep-24     Information published. 8.9    28-Sep-24     Information published. 9.0    29-Sep-24     Information published. 9.1    30-Sep-24     Information published. 9.2    01-Oct-24     Information published. 9.3    02-Oct-24     Information published. 9.4    03-Oct-24     Information published. 9.5    04-Oct-24     Information published. 9.6    05-Oct-24     Information published. 9.7    06-Oct-24     Information published. 9.8    07-Oct-24     Information published. 9.9    08-Oct-24     Information published. 10.0    09-Oct-24     Information published. 10.1    10-Oct-24     Information published. 10.2    11-Oct-24     Information published. 10.3    12-Oct-24     Information published. 10.4    13-Oct-24     Information published. 10.5    14-Oct-24     Information published. 10.6    15-Oct-24     Added python2 to CBL-Mariner 1.0 10.7    16-Oct-24     Added python2 to CBL-Mariner 1.0 10.8    17-Oct-24     Added python2 to CBL-Mariner 1.0 10.9    18-Oct-24     Added python2 to CBL-Mariner 1.0 11.0    19-Oct-24     Added python2 to CBL-Mariner 1.0 11.1    20-Oct-24     Added python2 to CBL-Mariner 1.0 11.2    21-Oct-24     Added python2 to CBL-Mariner 1.0 11.3    22-Oct-24     Added python2 to CBL-Mariner 1.0 11.4    23-Oct-24     Added python2 to CBL-Mariner 1.0 11.5    24-Oct-24     Added python2 to CBL-Mariner 1.0 11.6    25-Oct-24     Added python2 to CBL-Mariner 1.0 11.7    26-Oct-24     Added python2 to CBL-Mariner 1.0 11.8    27-Oct-24     Added python2 to CBL-Mariner 1.0 11.9    28-Oct-24     Added python2 to CBL-Mariner 1.0 12.0    29-Oct-24     Added python2 to CBL-Mariner 1.0 12.1    30-Oct-24     Added python2 to CBL-Mariner 1.0 12.2    31-Oct-24     Added python2 to CBL-Mariner 1.0 12.3    01-Nov-24     Added python2 to CBL-Mariner 1.0 12.4    02-Nov-24     Added python2 to CBL-Mariner 1.0 12.5    04-Nov-24     Added python2 to CBL-Mariner 1.0 12.6    05-Nov-24     Added python2 to CBL-Mariner 1.0 12.7    06-Nov-24     Added python2 to CBL-Mariner 1.0 12.8    07-Nov-24     Added python2 to CBL-Mariner 1.0 12.9    08-Nov-24     Added python2 to CBL-Mariner 1.0 13.0    09-Nov-24     Added python2 to CBL-Mariner 1.0 13.1    10-Nov-24     Added python2 to CBL-Mariner 1.0 13.2    11-Nov-24     Added python2 to CBL-Mariner 1.0 13.3    12-Nov-24     Added python2 to CBL-Mariner 1.0 13.4    13-Nov-24     Added python2 to CBL-Mariner 1.0 13.5    14-Nov-24     Added python2 to CBL-Mariner 1.0 13.6    15-Nov-24     Added python2 to CBL-Mariner 1.0 13.7    16-Nov-24     Added python2 to CBL-Mariner 1.0 13.8    17-Nov-24     Added python2 to CBL-Mariner 1.0 13.9    18-Nov-24     Added python2 to CBL-Mariner 1.0 14.0    19-Nov-24     Added python2 to CBL-Mariner 1.0 14.1    20-Nov-24     Added python2 to CBL-Mariner 1.0 14.2    21-Nov-24     Added python2 to CBL-Mariner 1.0 14.3    23-Nov-24     Added python2 to CBL-Mariner 1.0 14.4    24-Nov-24     Added python2 to CBL-Mariner 1.0 14.5    25-Nov-24     Added python2 to CBL-Mariner 1.0 14.6    26-Nov-24     Added python2 to CBL-Mariner 1.0 14.7    27-Nov-24     Added python2 to CBL-Mariner 1.0 14.8    28-Nov-24     Added python2 to CBL-Mariner 1.0 14.9    29-Nov-24     Added python2 to CBL-Mariner 1.0 15.0    30-Nov-24     Added python2 to CBL-Mariner 1.0 15.1    01-Dec-24     Added python2 to CBL-Mariner 1.0 15.2    02-Dec-24     Added python2 to CBL-Mariner 1.0 15.3    03-Dec-24     Added python2 to CBL-Mariner 1.0 15.4    04-Dec-24     Added python2 to CBL-Mariner 1.0 15.5    05-Dec-24     Added python2 to CBL-Mariner 1.0 15.6    07-Dec-24     Added python2 to CBL-Mariner 1.0 15.7    08-Dec-24     Added python2 to CBL-Mariner 1.0 15.8    09-Dec-24     Added python2 to CBL-Mariner 1.0 15.9    10-Dec-24     Added python2 to CBL-Mariner 1.0 16.0    11-Dec-24     Added python2 to CBL-Mariner 1.0 16.1    12-Dec-24     Added python2 to CBL-Mariner 1.0 16.2    13-Dec-24     Added python2 to CBL-Mariner 1.0 16.3    14-Dec-24     Added python2 to CBL-Mariner 1.0 16.4    15-Dec-24     Added python2 to CBL-Mariner 1.0 16.5    16-Dec-24     Added python2 to CBL-Mariner 1.0 16.6    17-Dec-24     Added python2 to CBL-Mariner 1.0 16.7    18-Dec-24     Added python2 to CBL-Mariner 1.0 16.8    19-Dec-24     Added python2 to CBL-Mariner 1.0 16.9    20-Dec-24     Added python2 to CBL-Mariner 1.0 17.0    21-Dec-24     Added python2 to CBL-Mariner 1.0 17.1    22-Dec-24     Added python2 to CBL-Mariner 1.0 17.2    23-Dec-24     Added python2 to CBL-Mariner 1.0 17.3    24-Dec-24     Added python2 to CBL-Mariner 1.0 17.4    25-Dec-24     Added python2 to CBL-Mariner 1.0 17.5    26-Dec-24     Added python2 to CBL-Mariner 1.0 17.6    27-Dec-24     Added python2 to CBL-Mariner 1.0 17.7    28-Dec-24     Added python2 to CBL-Mariner 1.0 17.8    29-Dec-24     Added python2 to CBL-Mariner 1.0 17.9    30-Dec-24     Added python2 to CBL-Mariner 1.0 18.0    31-Dec-24     Added python2 to CBL-Mariner 1.0 18.1    01-Jan-25     Added python2 to CBL-Mariner 1.0 18.2    02-Jan-25     Added python2 to CBL-Mariner 1.0 18.3    03-Jan-25     Added python2 to CBL-Mariner 1.0 18.4    04-Jan-25     Added python2 to CBL-Mariner 1.0 18.5    05-Jan-25     Added python2 to CBL-Mariner 1.0 18.6    06-Jan-25     Added python2 to CBL-Mariner 1.0 18.7    07-Jan-25     Added python2 to CBL-Mariner 1.0 18.8    08-Jan-25     Added python2 to CBL-Mariner 1.0 18.9    09-Jan-25     Added python2 to CBL-Mariner 1.0 19.0    10-Jan-25     Added python2 to CBL-Mariner 1.0 19.1    11-Jan-25     Added python2 to CBL-Mariner 1.0 19.2    12-Jan-25     Added python2 to CBL-Mariner 1.0 19.3    13-Jan-25     Added python2 to CBL-Mariner 1.0 19.4    15-Jan-25     Added python2 to CBL-Mariner 1.0 19.5    16-Jan-25     Added python2 to CBL-Mariner 1.0 19.6    17-Jan-25     Added python2 to CBL-Mariner 1.0 19.7    18-Jan-25     Added python2 to CBL-Mariner 1.0 19.8    19-Jan-25     Added python2 to CBL-Mariner 1.0 19.9    20-Jan-25     Added python2 to CBL-Mariner 1.0 20.0    21-Jan-25     Added python2 to CBL-Mariner 1.0 20.1    22-Jan-25     Added python2 to CBL-Mariner 1.0 20.2    23-Jan-25     Added python2 to CBL-Mariner 1.0 20.3    24-Jan-25     Added python2 to CBL-Mariner 1.0 20.4    25-Jan-25     Added python2 to CBL-Mariner 1.0 20.5    27-Jan-25     Added python2 to CBL-Mariner 1.0 20.6    28-Jan-25     Added python2 to CBL-Mariner 1.0 20.7    29-Jan-25     Added python2 to CBL-Mariner 1.0 20.8    30-Jan-25     Added python2 to CBL-Mariner 1.0 20.9    01-Feb-25     Added python2 to CBL-Mariner 1.0 21.0    02-Feb-25     Added python2 to CBL-Mariner 1.0 21.1    03-Feb-25     Added python2 to CBL-Mariner 1.0 21.2    04-Feb-25     Added python2 to CBL-Mariner 1.0 21.3    05-Feb-25     Added python2 to CBL-Mariner 1.0 21.4    07-Feb-25     Added python2 to CBL-Mariner 1.0 21.5    08-Feb-25     Added python2 to CBL-Mariner 1.0 21.6    09-Feb-25     Added python2 to CBL-Mariner 1.0 21.7    10-Feb-25     Added python2 to CBL-Mariner 1.0 21.8    11-Feb-25     Added python2 to CBL-Mariner 1.0 21.9    12-Feb-25     Added python2 to CBL-Mariner 1.0 22.0    13-Feb-25     Added python2 to CBL-Mariner 1.0 22.1    14-Feb-25     Added python2 to CBL-Mariner 1.0 22.2    15-Feb-25     Added python2 to CBL-Mariner 1.0 22.3    16-Feb-25     Added python2 to CBL-Mariner 1.0 22.4    17-Feb-25     Added python2 to CBL-Mariner 1.0 22.5    18-Feb-25     Added python2 to CBL-Mariner 1.0 22.6    19-Feb-25     Added python2 to CBL-Mariner 1.0 22.7    20-Feb-25     Added python2 to CBL-Mariner 1.0 22.8    21-Feb-25     Added python2 to CBL-Mariner 1.0 22.9    22-Feb-25     Added python2 to CBL-Mariner 1.0 23.0    23-Feb-25     Added python2 to CBL-Mariner 1.0 23.1    24-Feb-25     Added python2 to CBL-Mariner 1.0 23.2    25-Feb-25     Added python2 to CBL-Mariner 1.0 23.3    26-Feb-25     Added python2 to CBL-Mariner 1.0 23.4    27-Feb-25     Added python2 to CBL-Mariner 1.0 23.5    28-Feb-25     Added python2 to CBL-Mariner 1.0 23.6    01-Mar-25     Added python2 to CBL-Mariner 1.0 23.7    02-Mar-25     Added python2 to CBL-Mariner 1.0 23.8    03-Mar-25     Added python2 to CBL-Mariner 1.0 23.9    04-Mar-25     Added python2 to CBL-Mariner 1.0 24.0    05-Mar-25     Added python2 to CBL-Mariner 1.0 24.1    06-Mar-25     Added python2 to CBL-Mariner 1.0 24.2    08-Mar-25     Added python2 to CBL-Mariner 1.0 24.3    09-Mar-25     Added python2 to CBL-Mariner 1.0 24.4    10-Mar-25     Added python2 to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-9674 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 |
Unknown | None | |
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 |
Unknown | None | |
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-9674 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2012-2677
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Dec-24     Information published. 1.1    27-Feb-25     Added mysql to Azure Linux 3.0 1.2    28-Feb-25     Added mysql to Azure Linux 3.0 1.3    01-Mar-25     Added mysql to Azure Linux 3.0 1.4    02-Mar-25     Added mysql to Azure Linux 3.0 1.5    03-Mar-25     Added mysql to Azure Linux 3.0 1.6    04-Mar-25     Added mysql to Azure Linux 3.0 1.7    05-Mar-25     Added mysql to Azure Linux 3.0 1.8    06-Mar-25     Added mysql to Azure Linux 3.0 1.9    08-Mar-25     Added mysql to Azure Linux 3.0 2.0    09-Mar-25     Added mysql to Azure Linux 3.0 2.1    10-Mar-25     Added mysql to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2012-2677 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
8.0.40-4 |
Unknown | None | |
Azure Linux 3.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
8.0.40-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2012-2677 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2012-6708
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Sep-24     Information published. 1.1    03-Feb-25     Added slf4j to Azure Linux 3.0 1.2    04-Feb-25     Added slf4j to Azure Linux 3.0 1.3    05-Feb-25     Added slf4j to Azure Linux 3.0 1.4    07-Feb-25     Added slf4j to Azure Linux 3.0 1.5    08-Feb-25     Added slf4j to Azure Linux 3.0 1.6    09-Feb-25     Added slf4j to Azure Linux 3.0 1.7    10-Feb-25     Added slf4j to Azure Linux 3.0 1.8    11-Feb-25     Added slf4j to Azure Linux 3.0 1.9    12-Feb-25     Added slf4j to Azure Linux 3.0 2.0    13-Feb-25     Added slf4j to Azure Linux 3.0 2.1    14-Feb-25     Added slf4j to Azure Linux 3.0 2.2    15-Feb-25     Added slf4j to Azure Linux 3.0 2.3    16-Feb-25     Added slf4j to Azure Linux 3.0 2.4    17-Feb-25     Added slf4j to Azure Linux 3.0 2.5    18-Feb-25     Added slf4j to Azure Linux 3.0 2.6    19-Feb-25     Added slf4j to Azure Linux 3.0 2.7    20-Feb-25     Added slf4j to Azure Linux 3.0 2.8    21-Feb-25     Added slf4j to Azure Linux 3.0 2.9    22-Feb-25     Added slf4j to Azure Linux 3.0 3.0    23-Feb-25     Added slf4j to Azure Linux 3.0 3.1    24-Feb-25     Added slf4j to Azure Linux 3.0 3.2    25-Feb-25     Added slf4j to Azure Linux 3.0 3.3    26-Feb-25     Added slf4j to Azure Linux 3.0 3.4    27-Feb-25     Added slf4j to Azure Linux 3.0 3.5    28-Feb-25     Added slf4j to Azure Linux 3.0 3.6    01-Mar-25     Added slf4j to Azure Linux 3.0 3.7    02-Mar-25     Added slf4j to Azure Linux 3.0 3.8    03-Mar-25     Added slf4j to Azure Linux 3.0 3.9    04-Mar-25     Added slf4j to Azure Linux 3.0 4.0    05-Mar-25     Added slf4j to Azure Linux 3.0 4.1    06-Mar-25     Added slf4j to Azure Linux 3.0 4.2    08-Mar-25     Added slf4j to Azure Linux 3.0 4.3    09-Mar-25     Added slf4j to Azure Linux 3.0 4.4    10-Mar-25     Added slf4j to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2012-6708 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | slf4j (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.0.7-1 |
Unknown | None | |
Azure Linux 3.0 x64 | slf4j (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.0.7-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2012-6708 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-52338
MITRE NVD Issuing CNA: security@apache.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    13-Dec-24     Information published. 0.2    14-Dec-24     Information published. 0.3    15-Dec-24     Information published. 0.4    16-Dec-24     Information published. 0.5    17-Dec-24     Information published. 0.6    18-Dec-24     Information published. 0.7    19-Dec-24     Information published. 0.8    20-Dec-24     Information published. 0.9    21-Dec-24     Information published. 1.0    22-Dec-24     Information published. 1.1    23-Dec-24     Added libarrow to Azure Linux 3.0 1.2    24-Dec-24     Added libarrow to Azure Linux 3.0 1.3    25-Dec-24     Added libarrow to Azure Linux 3.0 1.4    26-Dec-24     Added libarrow to Azure Linux 3.0 1.5    27-Dec-24     Added libarrow to Azure Linux 3.0 1.6    28-Dec-24     Added libarrow to Azure Linux 3.0 1.7    29-Dec-24     Added libarrow to Azure Linux 3.0 1.8    30-Dec-24     Added libarrow to Azure Linux 3.0 1.9    31-Dec-24     Added libarrow to Azure Linux 3.0 2.0    01-Jan-25     Added libarrow to Azure Linux 3.0 2.1    02-Jan-25     Added libarrow to Azure Linux 3.0 2.2    03-Jan-25     Added libarrow to Azure Linux 3.0 2.3    04-Jan-25     Added libarrow to Azure Linux 3.0 2.4    05-Jan-25     Added libarrow to Azure Linux 3.0 2.5    06-Jan-25     Added libarrow to Azure Linux 3.0 2.6    07-Jan-25     Added libarrow to Azure Linux 3.0 2.7    08-Jan-25     Added libarrow to Azure Linux 3.0 2.8    09-Jan-25     Added libarrow to Azure Linux 3.0 2.9    10-Jan-25     Added libarrow to Azure Linux 3.0 3.0    11-Jan-25     Added libarrow to Azure Linux 3.0 3.1    12-Jan-25     Added libarrow to Azure Linux 3.0 3.2    13-Jan-25     Added libarrow to Azure Linux 3.0 3.3    15-Jan-25     Added libarrow to Azure Linux 3.0 3.4    16-Jan-25     Added libarrow to Azure Linux 3.0 3.5    17-Jan-25     Added libarrow to Azure Linux 3.0 3.6    18-Jan-25     Added libarrow to Azure Linux 3.0 3.7    19-Jan-25     Added libarrow to Azure Linux 3.0 3.8    20-Jan-25     Added libarrow to Azure Linux 3.0 3.9    21-Jan-25     Added libarrow to Azure Linux 3.0 4.0    22-Jan-25     Added libarrow to Azure Linux 3.0 4.1    23-Jan-25     Added libarrow to Azure Linux 3.0 4.2    24-Jan-25     Added libarrow to Azure Linux 3.0 4.3    25-Jan-25     Added libarrow to Azure Linux 3.0 4.4    27-Jan-25     Added libarrow to Azure Linux 3.0 4.5    28-Jan-25     Added libarrow to Azure Linux 3.0 4.6    29-Jan-25     Added libarrow to Azure Linux 3.0 4.7    30-Jan-25     Added libarrow to Azure Linux 3.0 4.8    01-Feb-25     Added libarrow to Azure Linux 3.0 4.9    02-Feb-25     Added libarrow to Azure Linux 3.0 5.0    03-Feb-25     Added libarrow to Azure Linux 3.0 5.1    04-Feb-25     Added libarrow to Azure Linux 3.0 5.2    05-Feb-25     Added libarrow to Azure Linux 3.0 5.3    07-Feb-25     Added libarrow to Azure Linux 3.0 5.4    08-Feb-25     Added libarrow to Azure Linux 3.0 5.5    09-Feb-25     Added libarrow to Azure Linux 3.0 5.6    10-Feb-25     Added libarrow to Azure Linux 3.0 5.7    11-Feb-25     Added libarrow to Azure Linux 3.0 5.8    12-Feb-25     Added libarrow to Azure Linux 3.0 5.9    13-Feb-25     Added libarrow to Azure Linux 3.0 6.0    14-Feb-25     Added libarrow to Azure Linux 3.0 6.1    15-Feb-25     Added libarrow to Azure Linux 3.0 6.2    16-Feb-25     Added libarrow to Azure Linux 3.0 6.3    17-Feb-25     Added libarrow to Azure Linux 3.0 6.4    18-Feb-25     Added libarrow to Azure Linux 3.0 6.5    19-Feb-25     Added libarrow to Azure Linux 3.0 6.6    20-Feb-25     Added libarrow to Azure Linux 3.0 6.7    21-Feb-25     Added libarrow to Azure Linux 3.0 6.8    22-Feb-25     Added libarrow to Azure Linux 3.0 6.9    23-Feb-25     Added libarrow to Azure Linux 3.0 7.0    24-Feb-25     Added libarrow to Azure Linux 3.0 7.1    25-Feb-25     Added libarrow to Azure Linux 3.0 7.2    26-Feb-25     Added libarrow to Azure Linux 3.0 7.3    27-Feb-25     Added libarrow to Azure Linux 3.0 7.4    28-Feb-25     Added libarrow to Azure Linux 3.0 7.5    01-Mar-25     Added libarrow to Azure Linux 3.0 7.6    02-Mar-25     Added libarrow to Azure Linux 3.0 7.7    03-Mar-25     Added libarrow to Azure Linux 3.0 7.8    04-Mar-25     Added libarrow to Azure Linux 3.0 7.9    05-Mar-25     Added libarrow to Azure Linux 3.0 8.0    06-Mar-25     Added libarrow to Azure Linux 3.0 8.1    08-Mar-25     Added libarrow to Azure Linux 3.0 8.2    09-Mar-25     Added libarrow to Azure Linux 3.0 8.3    10-Mar-25     Added libarrow to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-52338 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | libarrow (CBL-Mariner) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
15.0.0-7 |
Unknown | None | |
Azure Linux 3.0 x64 | libarrow (CBL-Mariner) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
15.0.0-7 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-52338 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-34062
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-May-24     Information published. 1.1    30-Jun-24     Information published. 1.2    29-Aug-24     Information published. 1.3    30-Aug-24     Information published. 1.4    31-Aug-24     Information published. 1.5    01-Sep-24     Information published. 1.6    02-Sep-24     Information published. 1.7    03-Sep-24     Information published. 1.8    05-Sep-24     Information published. 1.9    06-Sep-24     Information published. 2.0    07-Sep-24     Information published. 2.1    08-Sep-24     Information published. 2.2    11-Sep-24     Information published. 2.3    12-Sep-24     Information published. 2.4    13-Sep-24     Information published. 2.5    14-Sep-24     Information published. 2.6    15-Sep-24     Information published. 2.7    16-Sep-24     Information published. 2.8    17-Sep-24     Information published. 2.9    18-Sep-24     Information published. 3.0    19-Sep-24     Information published. 3.1    20-Sep-24     Information published. 3.2    21-Sep-24     Information published. 3.3    22-Sep-24     Information published. 3.4    23-Sep-24     Information published. 3.5    24-Sep-24     Information published. 3.6    25-Sep-24     Information published. 3.7    26-Sep-24     Information published. 3.8    27-Sep-24     Information published. 3.9    28-Sep-24     Information published. 4.0    29-Sep-24     Information published. 4.1    30-Sep-24     Information published. 4.2    01-Oct-24     Information published. 4.3    02-Oct-24     Information published. 4.4    03-Oct-24     Information published. 4.5    04-Oct-24     Information published. 4.6    05-Oct-24     Information published. 4.7    06-Oct-24     Information published. 4.8    07-Oct-24     Information published. 4.9    08-Oct-24     Information published. 5.0    09-Oct-24     Information published. 5.1    10-Oct-24     Information published. 5.2    11-Oct-24     Information published. 5.3    12-Oct-24     Information published. 5.4    13-Oct-24     Information published. 5.5    14-Oct-24     Information published. 5.6    15-Oct-24     Added python-tqdm to CBL-Mariner 2.0 5.7    16-Oct-24     Added python-tqdm to CBL-Mariner 2.0 5.8    17-Oct-24     Added python-tqdm to CBL-Mariner 2.0 5.9    18-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.0    19-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.1    20-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.2    21-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.3    22-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.4    23-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.5    24-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.6    25-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.7    26-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.8    27-Oct-24     Added python-tqdm to CBL-Mariner 2.0 6.9    28-Oct-24     Added python-tqdm to CBL-Mariner 2.0 7.0    29-Oct-24     Added python-tqdm to CBL-Mariner 2.0 7.1    30-Oct-24     Added python-tqdm to CBL-Mariner 2.0 7.2    31-Oct-24     Added python-tqdm to CBL-Mariner 2.0 7.3    01-Nov-24     Added python-tqdm to CBL-Mariner 2.0 7.4    02-Nov-24     Added python-tqdm to CBL-Mariner 2.0 7.5    04-Nov-24     Added python-tqdm to CBL-Mariner 2.0 7.6    05-Nov-24     Added python-tqdm to CBL-Mariner 2.0 7.7    06-Nov-24     Added python-tqdm to CBL-Mariner 2.0 7.8    07-Nov-24     Added python-tqdm to CBL-Mariner 2.0 7.9    08-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.0    09-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.1    10-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.2    11-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.3    12-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.4    13-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.5    14-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.6    15-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.7    16-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.8    17-Nov-24     Added python-tqdm to CBL-Mariner 2.0 8.9    18-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.0    19-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.1    20-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.2    21-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.3    23-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.4    24-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.5    25-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.6    26-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.7    27-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.8    28-Nov-24     Added python-tqdm to CBL-Mariner 2.0 9.9    29-Nov-24     Added python-tqdm to CBL-Mariner 2.0 10.0    30-Nov-24     Added python-tqdm to CBL-Mariner 2.0 10.1    01-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.2    02-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.3    03-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.4    04-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.5    05-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.6    07-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.7    08-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.8    09-Dec-24     Added python-tqdm to CBL-Mariner 2.0 10.9    10-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.0    11-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.1    12-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.2    13-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.3    14-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.4    15-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.5    16-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.6    17-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.7    18-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.8    19-Dec-24     Added python-tqdm to CBL-Mariner 2.0 11.9    20-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.0    21-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.1    22-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.2    23-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.3    24-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.4    25-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.5    26-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.6    27-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.7    28-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.8    29-Dec-24     Added python-tqdm to CBL-Mariner 2.0 12.9    30-Dec-24     Added python-tqdm to CBL-Mariner 2.0 13.0    31-Dec-24     Added python-tqdm to CBL-Mariner 2.0 13.1    01-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.2    02-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.3    03-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.4    04-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.5    05-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.6    06-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.7    07-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.8    08-Jan-25     Added python-tqdm to CBL-Mariner 2.0 13.9    09-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.0    10-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.1    11-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.2    12-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.3    13-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.4    15-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.5    16-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.6    17-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.7    18-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.8    19-Jan-25     Added python-tqdm to CBL-Mariner 2.0 14.9    20-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.0    21-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.1    22-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.2    23-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.3    24-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.4    25-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.5    27-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.6    28-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.7    29-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.8    30-Jan-25     Added python-tqdm to CBL-Mariner 2.0 15.9    01-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.0    02-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.1    03-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.2    04-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.3    05-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.4    07-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.5    08-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.6    09-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.7    10-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.8    11-Feb-25     Added python-tqdm to CBL-Mariner 2.0 16.9    12-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.0    13-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.1    14-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.2    15-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.3    16-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.4    17-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.5    18-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.6    19-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.7    20-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.8    21-Feb-25     Added python-tqdm to CBL-Mariner 2.0 17.9    22-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.0    23-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.1    24-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.2    25-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.3    26-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.4    27-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.5    28-Feb-25     Added python-tqdm to CBL-Mariner 2.0 18.6    01-Mar-25     Added python-tqdm to CBL-Mariner 2.0 18.7    02-Mar-25     Added python-tqdm to CBL-Mariner 2.0 18.8    03-Mar-25     Added python-tqdm to CBL-Mariner 2.0 18.9    04-Mar-25     Added python-tqdm to CBL-Mariner 2.0 19.0    05-Mar-25     Added python-tqdm to CBL-Mariner 2.0 19.1    06-Mar-25     Added python-tqdm to CBL-Mariner 2.0 19.2    08-Mar-25     Added python-tqdm to CBL-Mariner 2.0 19.3    09-Mar-25     Added python-tqdm to CBL-Mariner 2.0 19.4    10-Mar-25     Added python-tqdm to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-34062 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | python-tqdm (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
4.63.1-3 |
Unknown | None | |
CBL Mariner 2.0 x64 | python-tqdm (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
4.63.1-3 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-34062 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-32020
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.9/TemporalScore:3.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    17-May-24     Information published. 1.1    30-Jun-24     Information published. 1.2    29-Aug-24     Information published. 1.3    30-Aug-24     Information published. 1.4    31-Aug-24     Information published. 1.5    01-Sep-24     Information published. 1.6    02-Sep-24     Information published. 1.7    03-Sep-24     Information published. 1.8    05-Sep-24     Information published. 1.9    06-Sep-24     Information published. 2.0    07-Sep-24     Information published. 2.1    08-Sep-24     Information published. 2.2    11-Sep-24     Information published. 2.3    12-Sep-24     Information published. 2.4    13-Sep-24     Information published. 2.5    14-Sep-24     Information published. 2.6    15-Sep-24     Information published. 2.7    16-Sep-24     Information published. 2.8    17-Sep-24     Information published. 2.9    18-Sep-24     Information published. 3.0    19-Sep-24     Information published. 3.1    20-Sep-24     Information published. 3.2    21-Sep-24     Information published. 3.3    22-Sep-24     Information published. 3.4    23-Sep-24     Information published. 3.5    24-Sep-24     Information published. 3.6    25-Sep-24     Information published. 3.7    26-Sep-24     Information published. 3.8    27-Sep-24     Information published. 3.9    28-Sep-24     Information published. 4.0    29-Sep-24     Information published. 4.1    30-Sep-24     Information published. 4.2    01-Oct-24     Information published. 4.3    02-Oct-24     Information published. 4.4    03-Oct-24     Information published. 4.5    04-Oct-24     Information published. 4.6    05-Oct-24     Information published. 4.7    06-Oct-24     Information published. 4.8    07-Oct-24     Information published. 4.9    08-Oct-24     Information published. 5.0    09-Oct-24     Information published. 5.1    10-Oct-24     Information published. 5.2    11-Oct-24     Information published. 5.3    12-Oct-24     Information published. 5.4    13-Oct-24     Information published. 5.5    14-Oct-24     Information published. 5.6    15-Oct-24     Added git to CBL-Mariner 2.0 5.7    16-Oct-24     Added git to CBL-Mariner 2.0 5.8    17-Oct-24     Added git to CBL-Mariner 2.0 5.9    18-Oct-24     Added git to CBL-Mariner 2.0 6.0    19-Oct-24     Added git to CBL-Mariner 2.0 6.1    20-Oct-24     Added git to CBL-Mariner 2.0 6.2    21-Oct-24     Added git to CBL-Mariner 2.0 6.3    22-Oct-24     Added git to CBL-Mariner 2.0 6.4    23-Oct-24     Added git to CBL-Mariner 2.0 6.5    24-Oct-24     Added git to CBL-Mariner 2.0 6.6    25-Oct-24     Added git to CBL-Mariner 2.0 6.7    26-Oct-24     Added git to CBL-Mariner 2.0 6.8    27-Oct-24     Added git to CBL-Mariner 2.0 6.9    28-Oct-24     Added git to CBL-Mariner 2.0 7.0    29-Oct-24     Added git to CBL-Mariner 2.0 7.1    30-Oct-24     Added git to CBL-Mariner 2.0 7.2    31-Oct-24     Added git to CBL-Mariner 2.0 7.3    01-Nov-24     Added git to CBL-Mariner 2.0 7.4    02-Nov-24     Added git to CBL-Mariner 2.0 7.5    04-Nov-24     Added git to CBL-Mariner 2.0 7.6    05-Nov-24     Added git to CBL-Mariner 2.0 7.7    06-Nov-24     Added git to CBL-Mariner 2.0 7.8    07-Nov-24     Added git to CBL-Mariner 2.0 7.9    08-Nov-24     Added git to CBL-Mariner 2.0 8.0    09-Nov-24     Added git to CBL-Mariner 2.0 8.1    10-Nov-24     Added git to CBL-Mariner 2.0 8.2    11-Nov-24     Added git to CBL-Mariner 2.0 8.3    12-Nov-24     Added git to CBL-Mariner 2.0 8.4    13-Nov-24     Added git to CBL-Mariner 2.0 8.5    14-Nov-24     Added git to CBL-Mariner 2.0 8.6    15-Nov-24     Added git to CBL-Mariner 2.0 8.7    16-Nov-24     Added git to CBL-Mariner 2.0 8.8    17-Nov-24     Added git to CBL-Mariner 2.0 8.9    18-Nov-24     Added git to CBL-Mariner 2.0 9.0    19-Nov-24     Added git to CBL-Mariner 2.0 9.1    20-Nov-24     Added git to CBL-Mariner 2.0 9.2    21-Nov-24     Added git to CBL-Mariner 2.0 9.3    23-Nov-24     Added git to CBL-Mariner 2.0 9.4    24-Nov-24     Added git to CBL-Mariner 2.0 9.5    25-Nov-24     Added git to CBL-Mariner 2.0 9.6    26-Nov-24     Added git to CBL-Mariner 2.0 9.7    27-Nov-24     Added git to CBL-Mariner 2.0 9.8    28-Nov-24     Added git to CBL-Mariner 2.0 9.9    29-Nov-24     Added git to CBL-Mariner 2.0 10.0    30-Nov-24     Added git to CBL-Mariner 2.0 10.1    01-Dec-24     Added git to CBL-Mariner 2.0 10.2    02-Dec-24     Added git to CBL-Mariner 2.0 10.3    03-Dec-24     Added git to CBL-Mariner 2.0 10.4    04-Dec-24     Added git to CBL-Mariner 2.0 10.5    05-Dec-24     Added git to CBL-Mariner 2.0 10.6    07-Dec-24     Added git to CBL-Mariner 2.0 10.7    08-Dec-24     Added git to CBL-Mariner 2.0 10.8    09-Dec-24     Added git to CBL-Mariner 2.0 10.9    10-Dec-24     Added git to CBL-Mariner 2.0 11.0    11-Dec-24     Added git to CBL-Mariner 2.0 11.1    12-Dec-24     Added git to CBL-Mariner 2.0 11.2    13-Dec-24     Added git to CBL-Mariner 2.0 11.3    14-Dec-24     Added git to CBL-Mariner 2.0 11.4    15-Dec-24     Added git to CBL-Mariner 2.0 11.5    16-Dec-24     Added git to CBL-Mariner 2.0 11.6    17-Dec-24     Added git to CBL-Mariner 2.0 11.7    18-Dec-24     Added git to CBL-Mariner 2.0 11.8    19-Dec-24     Added git to CBL-Mariner 2.0 11.9    20-Dec-24     Added git to CBL-Mariner 2.0 12.0    21-Dec-24     Added git to CBL-Mariner 2.0 12.1    22-Dec-24     Added git to CBL-Mariner 2.0 12.2    23-Dec-24     Added git to CBL-Mariner 2.0 12.3    24-Dec-24     Added git to CBL-Mariner 2.0 12.4    25-Dec-24     Added git to CBL-Mariner 2.0 12.5    26-Dec-24     Added git to CBL-Mariner 2.0 12.6    27-Dec-24     Added git to CBL-Mariner 2.0 12.7    28-Dec-24     Added git to CBL-Mariner 2.0 12.8    29-Dec-24     Added git to CBL-Mariner 2.0 12.9    30-Dec-24     Added git to CBL-Mariner 2.0 13.0    31-Dec-24     Added git to CBL-Mariner 2.0 13.1    01-Jan-25     Added git to CBL-Mariner 2.0 13.2    02-Jan-25     Added git to CBL-Mariner 2.0 13.3    03-Jan-25     Added git to CBL-Mariner 2.0 13.4    04-Jan-25     Added git to CBL-Mariner 2.0 13.5    05-Jan-25     Added git to CBL-Mariner 2.0 13.6    06-Jan-25     Added git to CBL-Mariner 2.0 13.7    07-Jan-25     Added git to CBL-Mariner 2.0 13.8    08-Jan-25     Added git to CBL-Mariner 2.0 13.9    09-Jan-25     Added git to CBL-Mariner 2.0 14.0    10-Jan-25     Added git to CBL-Mariner 2.0 14.1    11-Jan-25     Added git to CBL-Mariner 2.0 14.2    12-Jan-25     Added git to CBL-Mariner 2.0 14.3    13-Jan-25     Added git to CBL-Mariner 2.0 14.4    15-Jan-25     Added git to CBL-Mariner 2.0 14.5    16-Jan-25     Added git to CBL-Mariner 2.0 14.6    17-Jan-25     Added git to CBL-Mariner 2.0 14.7    18-Jan-25     Added git to CBL-Mariner 2.0 14.8    19-Jan-25     Added git to CBL-Mariner 2.0 14.9    20-Jan-25     Added git to CBL-Mariner 2.0 15.0    21-Jan-25     Added git to CBL-Mariner 2.0 15.1    22-Jan-25     Added git to CBL-Mariner 2.0 15.2    23-Jan-25     Added git to CBL-Mariner 2.0 15.3    24-Jan-25     Added git to CBL-Mariner 2.0 15.4    25-Jan-25     Added git to CBL-Mariner 2.0 15.5    27-Jan-25     Added git to CBL-Mariner 2.0 15.6    28-Jan-25     Added git to CBL-Mariner 2.0 15.7    29-Jan-25     Added git to CBL-Mariner 2.0 15.8    30-Jan-25     Added git to CBL-Mariner 2.0 15.9    01-Feb-25     Added git to CBL-Mariner 2.0 16.0    02-Feb-25     Added git to CBL-Mariner 2.0 16.1    03-Feb-25     Added git to CBL-Mariner 2.0 16.2    04-Feb-25     Added git to CBL-Mariner 2.0 16.3    05-Feb-25     Added git to CBL-Mariner 2.0 16.4    07-Feb-25     Added git to CBL-Mariner 2.0 16.5    08-Feb-25     Added git to CBL-Mariner 2.0 16.6    09-Feb-25     Added git to CBL-Mariner 2.0 16.7    10-Feb-25     Added git to CBL-Mariner 2.0 16.8    11-Feb-25     Added git to CBL-Mariner 2.0 16.9    12-Feb-25     Added git to CBL-Mariner 2.0 17.0    13-Feb-25     Added git to CBL-Mariner 2.0 17.1    14-Feb-25     Added git to CBL-Mariner 2.0 17.2    15-Feb-25     Added git to CBL-Mariner 2.0 17.3    16-Feb-25     Added git to CBL-Mariner 2.0 17.4    17-Feb-25     Added git to CBL-Mariner 2.0 17.5    18-Feb-25     Added git to CBL-Mariner 2.0 17.6    19-Feb-25     Added git to CBL-Mariner 2.0 17.7    20-Feb-25     Added git to CBL-Mariner 2.0 17.8    21-Feb-25     Added git to CBL-Mariner 2.0 17.9    22-Feb-25     Added git to CBL-Mariner 2.0 18.0    23-Feb-25     Added git to CBL-Mariner 2.0 18.1    24-Feb-25     Added git to CBL-Mariner 2.0 18.2    25-Feb-25     Added git to CBL-Mariner 2.0 18.3    26-Feb-25     Added git to CBL-Mariner 2.0 18.4    27-Feb-25     Added git to CBL-Mariner 2.0 18.5    28-Feb-25     Added git to CBL-Mariner 2.0 18.6    01-Mar-25     Added git to CBL-Mariner 2.0 18.7    02-Mar-25     Added git to CBL-Mariner 2.0 18.8    03-Mar-25     Added git to CBL-Mariner 2.0 18.9    04-Mar-25     Added git to CBL-Mariner 2.0 19.0    05-Mar-25     Added git to CBL-Mariner 2.0 19.1    06-Mar-25     Added git to CBL-Mariner 2.0 19.2    08-Mar-25     Added git to CBL-Mariner 2.0 19.3    09-Mar-25     Added git to CBL-Mariner 2.0 19.4    10-Mar-25     Added git to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-32020 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 3.9 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 3.9 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | git (CBL-Mariner) | Unknown | Unknown | Base: 3.9 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L |
2.39.4-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | git (CBL-Mariner) | Unknown | Unknown | Base: 3.9 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L |
2.39.4-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-32020 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-7383
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Sep-24     Information published. 1.1    15-Oct-24     Added libnbd to CBL-Mariner 2.0 1.2    16-Oct-24     Added libnbd to CBL-Mariner 2.0 1.3    17-Oct-24     Added libnbd to CBL-Mariner 2.0 1.4    18-Oct-24     Added libnbd to CBL-Mariner 2.0 1.5    19-Oct-24     Added libnbd to CBL-Mariner 2.0 1.6    20-Oct-24     Added libnbd to CBL-Mariner 2.0 1.7    21-Oct-24     Added libnbd to CBL-Mariner 2.0 1.8    22-Oct-24     Added libnbd to CBL-Mariner 2.0 1.9    23-Oct-24     Added libnbd to CBL-Mariner 2.0 2.0    24-Oct-24     Added libnbd to CBL-Mariner 2.0 2.1    25-Oct-24     Added libnbd to CBL-Mariner 2.0 2.2    26-Oct-24     Added libnbd to CBL-Mariner 2.0 2.3    27-Oct-24     Added libnbd to CBL-Mariner 2.0 2.4    28-Oct-24     Added libnbd to CBL-Mariner 2.0 2.5    29-Oct-24     Added libnbd to CBL-Mariner 2.0 2.6    30-Oct-24     Added libnbd to CBL-Mariner 2.0 2.7    31-Oct-24     Added libnbd to CBL-Mariner 2.0 2.8    01-Nov-24     Added libnbd to CBL-Mariner 2.0 2.9    02-Nov-24     Added libnbd to CBL-Mariner 2.0 3.0    04-Nov-24     Added libnbd to CBL-Mariner 2.0 3.1    05-Nov-24     Added libnbd to CBL-Mariner 2.0 3.2    06-Nov-24     Added libnbd to CBL-Mariner 2.0 3.3    07-Nov-24     Added libnbd to CBL-Mariner 2.0 3.4    08-Nov-24     Added libnbd to CBL-Mariner 2.0 3.5    09-Nov-24     Added libnbd to CBL-Mariner 2.0 3.6    10-Nov-24     Added libnbd to CBL-Mariner 2.0 3.7    11-Nov-24     Added libnbd to CBL-Mariner 2.0 3.8    12-Nov-24     Added libnbd to CBL-Mariner 2.0 3.9    13-Nov-24     Added libnbd to CBL-Mariner 2.0 4.0    14-Nov-24     Added libnbd to CBL-Mariner 2.0 4.1    15-Nov-24     Added libnbd to CBL-Mariner 2.0 4.2    16-Nov-24     Added libnbd to CBL-Mariner 2.0 4.3    17-Nov-24     Added libnbd to CBL-Mariner 2.0 4.4    18-Nov-24     Added libnbd to CBL-Mariner 2.0 4.5    19-Nov-24     Added libnbd to CBL-Mariner 2.0 4.6    20-Nov-24     Added libnbd to CBL-Mariner 2.0 4.7    21-Nov-24     Added libnbd to CBL-Mariner 2.0 4.8    23-Nov-24     Added libnbd to CBL-Mariner 2.0 4.9    24-Nov-24     Added libnbd to CBL-Mariner 2.0 5.0    25-Nov-24     Added libnbd to CBL-Mariner 2.0 5.1    26-Nov-24     Added libnbd to CBL-Mariner 2.0 5.2    27-Nov-24     Added libnbd to CBL-Mariner 2.0 5.3    28-Nov-24     Added libnbd to CBL-Mariner 2.0 5.4    29-Nov-24     Added libnbd to CBL-Mariner 2.0 5.5    30-Nov-24     Added libnbd to CBL-Mariner 2.0 5.6    01-Dec-24     Added libnbd to CBL-Mariner 2.0 5.7    02-Dec-24     Added libnbd to CBL-Mariner 2.0 5.8    03-Dec-24     Added libnbd to CBL-Mariner 2.0 5.9    04-Dec-24     Added libnbd to CBL-Mariner 2.0 6.0    05-Dec-24     Added libnbd to CBL-Mariner 2.0 6.1    07-Dec-24     Added libnbd to CBL-Mariner 2.0 6.2    08-Dec-24     Added libnbd to CBL-Mariner 2.0 6.3    09-Dec-24     Added libnbd to CBL-Mariner 2.0 6.4    10-Dec-24     Added libnbd to CBL-Mariner 2.0 6.5    11-Dec-24     Added libnbd to CBL-Mariner 2.0 6.6    12-Dec-24     Added libnbd to CBL-Mariner 2.0 6.7    13-Dec-24     Added libnbd to CBL-Mariner 2.0 6.8    14-Dec-24     Added libnbd to CBL-Mariner 2.0 6.9    15-Dec-24     Added libnbd to CBL-Mariner 2.0 7.0    16-Dec-24     Added libnbd to CBL-Mariner 2.0 7.1    17-Dec-24     Added libnbd to CBL-Mariner 2.0 7.2    18-Dec-24     Added libnbd to CBL-Mariner 2.0 7.3    19-Dec-24     Added libnbd to CBL-Mariner 2.0 7.4    20-Dec-24     Added libnbd to CBL-Mariner 2.0 7.5    21-Dec-24     Added libnbd to CBL-Mariner 2.0 7.6    22-Dec-24     Added libnbd to CBL-Mariner 2.0 7.7    23-Dec-24     Added libnbd to CBL-Mariner 2.0 7.8    24-Dec-24     Added libnbd to CBL-Mariner 2.0 7.9    25-Dec-24     Added libnbd to CBL-Mariner 2.0 8.0    26-Dec-24     Added libnbd to CBL-Mariner 2.0 8.1    27-Dec-24     Added libnbd to CBL-Mariner 2.0 8.2    28-Dec-24     Added libnbd to CBL-Mariner 2.0 8.3    29-Dec-24     Added libnbd to CBL-Mariner 2.0 8.4    30-Dec-24     Added libnbd to CBL-Mariner 2.0 8.5    31-Dec-24     Added libnbd to CBL-Mariner 2.0 8.6    01-Jan-25     Added libnbd to CBL-Mariner 2.0 8.7    02-Jan-25     Added libnbd to CBL-Mariner 2.0 8.8    03-Jan-25     Added libnbd to CBL-Mariner 2.0 8.9    04-Jan-25     Added libnbd to CBL-Mariner 2.0 9.0    05-Jan-25     Added libnbd to CBL-Mariner 2.0 9.1    06-Jan-25     Added libnbd to CBL-Mariner 2.0 9.2    07-Jan-25     Added libnbd to CBL-Mariner 2.0 9.3    08-Jan-25     Added libnbd to CBL-Mariner 2.0 9.4    09-Jan-25     Added libnbd to CBL-Mariner 2.0 9.5    10-Jan-25     Added libnbd to CBL-Mariner 2.0 9.6    11-Jan-25     Added libnbd to CBL-Mariner 2.0 9.7    12-Jan-25     Added libnbd to CBL-Mariner 2.0 9.8    13-Jan-25     Added libnbd to CBL-Mariner 2.0 9.9    15-Jan-25     Added libnbd to CBL-Mariner 2.0 10.0    16-Jan-25     Added libnbd to CBL-Mariner 2.0 10.1    17-Jan-25     Added libnbd to CBL-Mariner 2.0 10.2    18-Jan-25     Added libnbd to CBL-Mariner 2.0 10.3    19-Jan-25     Added libnbd to CBL-Mariner 2.0 10.4    20-Jan-25     Added libnbd to CBL-Mariner 2.0 10.5    21-Jan-25     Added libnbd to CBL-Mariner 2.0 10.6    22-Jan-25     Added libnbd to CBL-Mariner 2.0 10.7    23-Jan-25     Added libnbd to CBL-Mariner 2.0 10.8    24-Jan-25     Added libnbd to CBL-Mariner 2.0 10.9    25-Jan-25     Added libnbd to CBL-Mariner 2.0 11.0    27-Jan-25     Added libnbd to CBL-Mariner 2.0 11.1    28-Jan-25     Added libnbd to CBL-Mariner 2.0 11.2    29-Jan-25     Added libnbd to CBL-Mariner 2.0 11.3    30-Jan-25     Added libnbd to CBL-Mariner 2.0 11.4    01-Feb-25     Added libnbd to CBL-Mariner 2.0 11.5    02-Feb-25     Added libnbd to CBL-Mariner 2.0 11.6    03-Feb-25     Added libnbd to CBL-Mariner 2.0 11.7    04-Feb-25     Added libnbd to CBL-Mariner 2.0 11.8    05-Feb-25     Added libnbd to CBL-Mariner 2.0 11.9    07-Feb-25     Added libnbd to CBL-Mariner 2.0 12.0    08-Feb-25     Added libnbd to CBL-Mariner 2.0 12.1    09-Feb-25     Added libnbd to CBL-Mariner 2.0 12.2    10-Feb-25     Added libnbd to CBL-Mariner 2.0 12.3    11-Feb-25     Added libnbd to CBL-Mariner 2.0 12.4    12-Feb-25     Added libnbd to CBL-Mariner 2.0 12.5    13-Feb-25     Added libnbd to CBL-Mariner 2.0 12.6    14-Feb-25     Added libnbd to CBL-Mariner 2.0 12.7    15-Feb-25     Added libnbd to CBL-Mariner 2.0 12.8    16-Feb-25     Added libnbd to CBL-Mariner 2.0 12.9    17-Feb-25     Added libnbd to CBL-Mariner 2.0 13.0    18-Feb-25     Added libnbd to CBL-Mariner 2.0 13.1    19-Feb-25     Added libnbd to CBL-Mariner 2.0 13.2    20-Feb-25     Added libnbd to CBL-Mariner 2.0 13.3    21-Feb-25     Added libnbd to CBL-Mariner 2.0 13.4    22-Feb-25     Added libnbd to CBL-Mariner 2.0 13.5    23-Feb-25     Added libnbd to CBL-Mariner 2.0 13.6    24-Feb-25     Added libnbd to CBL-Mariner 2.0 13.7    25-Feb-25     Added libnbd to CBL-Mariner 2.0 13.8    26-Feb-25     Added libnbd to CBL-Mariner 2.0 13.9    27-Feb-25     Added libnbd to CBL-Mariner 2.0 14.0    28-Feb-25     Added libnbd to CBL-Mariner 2.0 14.1    01-Mar-25     Added libnbd to CBL-Mariner 2.0 14.2    02-Mar-25     Added libnbd to CBL-Mariner 2.0 14.3    03-Mar-25     Added libnbd to CBL-Mariner 2.0 14.4    04-Mar-25     Added libnbd to CBL-Mariner 2.0 14.5    05-Mar-25     Added libnbd to CBL-Mariner 2.0 14.6    06-Mar-25     Added libnbd to CBL-Mariner 2.0 14.7    08-Mar-25     Added libnbd to CBL-Mariner 2.0 14.8    09-Mar-25     Added libnbd to CBL-Mariner 2.0 14.9    10-Mar-25     Added libnbd to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7383 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | libnbd (CBL-Mariner) | Unknown | Unknown | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
1.12.1-4 |
Unknown | None | |
CBL Mariner 2.0 x64 | libnbd (CBL-Mariner) | Unknown | Unknown | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
1.12.1-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-7383 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-40898
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Sep-24     Information published. 1.1    14-Sep-24     Information published. 1.2    15-Sep-24     Information published. 1.3    16-Sep-24     Information published. 1.4    17-Sep-24     Information published. 1.5    18-Sep-24     Information published. 1.6    19-Sep-24     Information published. 1.7    20-Sep-24     Information published. 1.8    21-Sep-24     Information published. 1.9    22-Sep-24     Information published. 2.0    23-Sep-24     Information published. 2.1    24-Sep-24     Information published. 2.2    25-Sep-24     Information published. 2.3    26-Sep-24     Information published. 2.4    27-Sep-24     Information published. 2.5    28-Sep-24     Information published. 2.6    29-Sep-24     Information published. 2.7    30-Sep-24     Information published. 2.8    01-Oct-24     Information published. 2.9    02-Oct-24     Information published. 3.0    03-Oct-24     Information published. 3.1    04-Oct-24     Information published. 3.2    05-Oct-24     Information published. 3.3    06-Oct-24     Information published. 3.4    07-Oct-24     Information published. 3.5    09-Oct-24     Information published. 3.6    10-Oct-24     Information published. 3.7    11-Oct-24     Information published. 3.8    12-Oct-24     Information published. 3.9    13-Oct-24     Information published. 4.0    14-Oct-24     Information published. 4.1    15-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.2    16-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.3    17-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.4    18-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.5    19-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.6    20-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.7    21-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.8    22-Oct-24     Added python-wheel to CBL-Mariner 2.0 4.9    23-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.0    24-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.1    25-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.2    26-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.3    27-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.4    28-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.5    29-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.6    30-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.7    31-Oct-24     Added python-wheel to CBL-Mariner 2.0 5.8    01-Nov-24     Added python-wheel to CBL-Mariner 2.0 5.9    02-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.0    04-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.1    05-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.2    06-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.3    07-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.4    08-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.5    09-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.6    10-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.7    11-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.8    12-Nov-24     Added python-wheel to CBL-Mariner 2.0 6.9    13-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.0    14-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.1    15-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.2    16-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.3    17-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.4    18-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.5    19-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.6    20-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.7    21-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.8    23-Nov-24     Added python-wheel to CBL-Mariner 2.0 7.9    24-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.0    25-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.1    26-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.2    27-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.3    28-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.4    29-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.5    30-Nov-24     Added python-wheel to CBL-Mariner 2.0 8.6    01-Dec-24     Added python-wheel to CBL-Mariner 2.0 8.7    02-Dec-24     Added python-wheel to CBL-Mariner 2.0 8.8    03-Dec-24     Added python-wheel to CBL-Mariner 2.0 8.9    04-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.0    05-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.1    07-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.2    08-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.3    09-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.4    10-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.5    11-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.6    12-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.7    13-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.8    14-Dec-24     Added python-wheel to CBL-Mariner 2.0 9.9    15-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.0    16-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.1    17-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.2    18-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.3    19-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.4    20-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.5    21-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.6    22-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.7    23-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.8    24-Dec-24     Added python-wheel to CBL-Mariner 2.0 10.9    25-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.0    26-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.1    27-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.2    28-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.3    29-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.4    30-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.5    31-Dec-24     Added python-wheel to CBL-Mariner 2.0 11.6    01-Jan-25     Added python-wheel to CBL-Mariner 2.0 11.7    02-Jan-25     Added python-wheel to CBL-Mariner 2.0 11.8    03-Jan-25     Added python-wheel to CBL-Mariner 2.0 11.9    04-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.0    05-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.1    06-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.2    07-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.3    08-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.4    09-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.5    10-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.6    11-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.7    12-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.8    13-Jan-25     Added python-wheel to CBL-Mariner 2.0 12.9    15-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.0    16-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.1    17-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.2    18-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.3    19-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.4    20-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.5    21-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.6    22-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.7    23-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.8    24-Jan-25     Added python-wheel to CBL-Mariner 2.0 13.9    25-Jan-25     Added python-wheel to CBL-Mariner 2.0 14.0    27-Jan-25     Added python-wheel to CBL-Mariner 2.0 14.1    28-Jan-25     Added python-wheel to CBL-Mariner 2.0 14.2    29-Jan-25     Added python-wheel to CBL-Mariner 2.0 14.3    30-Jan-25     Added python-wheel to CBL-Mariner 2.0 14.4    01-Feb-25     Added python-wheel to CBL-Mariner 2.0 14.5    02-Feb-25     Added python-wheel to CBL-Mariner 2.0 14.6    03-Feb-25     Added python-wheel to CBL-Mariner 2.0 14.7    04-Feb-25     Added python-wheel to CBL-Mariner 2.0 14.8    05-Feb-25     Added python-wheel to CBL-Mariner 2.0 14.9    07-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.0    08-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.1    09-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.2    10-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.3    11-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.4    12-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.5    13-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.6    14-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.7    15-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.8    16-Feb-25     Added python-wheel to CBL-Mariner 2.0 15.9    17-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.0    18-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.1    19-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.2    20-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.3    21-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.4    22-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.5    23-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.6    24-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.7    25-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.8    26-Feb-25     Added python-wheel to CBL-Mariner 2.0 16.9    27-Feb-25     Added python-wheel to CBL-Mariner 2.0 17.0    28-Feb-25     Added python-wheel to CBL-Mariner 2.0 17.1    01-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.2    02-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.3    03-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.4    04-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.5    05-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.6    06-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.7    08-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.8    09-Mar-25     Added python-wheel to CBL-Mariner 2.0 17.9    10-Mar-25     Added python-wheel to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-40898 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | python-wheel (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
0.33.6-8 |
Unknown | None | |
CBL Mariner 2.0 x64 | python-wheel (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
0.33.6-8 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-40898 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-14584
MITRE NVD Issuing CNA: secure@intel.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Dec-24     Information published. 1.1    08-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.2    09-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.3    10-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.4    11-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.5    12-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.6    13-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.7    14-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.8    15-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 1.9    16-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.0    17-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.1    18-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.2    19-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.3    20-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.4    21-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.5    22-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.6    23-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.7    24-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.8    25-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 2.9    26-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.0    27-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.1    28-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.2    29-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.3    30-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.4    31-Dec-24     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.5    01-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.6    02-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.7    03-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.8    04-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 3.9    05-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.0    06-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.1    07-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.2    08-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.3    09-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.4    10-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.5    11-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.6    12-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.7    13-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.8    15-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 4.9    16-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.0    17-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.1    18-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.2    19-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.3    20-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.4    21-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.5    22-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.6    23-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.7    24-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.8    25-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 5.9    27-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.0    28-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.1    29-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.2    30-Jan-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.3    01-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.4    02-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.5    03-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.6    04-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.7    05-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.8    07-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 6.9    08-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.0    09-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.1    10-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.2    11-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.3    12-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.4    13-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.5    14-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.6    15-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.7    16-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.8    17-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 7.9    18-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.0    19-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.1    20-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.2    21-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.3    22-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.4    23-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.5    24-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.6    25-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.7    26-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.8    27-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 8.9    28-Feb-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.0    01-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.1    02-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.2    03-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.3    04-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.4    05-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.5    06-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.6    08-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.7    09-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 9.8    10-Mar-25     Added shim-unsigned-aarch64 to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-14584 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | shim-unsigned-aarch64 (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
15.8-3 |
Unknown | None | |
Azure Linux 3.0 x64 | shim-unsigned-aarch64 (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
15.8-3 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-14584 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-32746
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    15-Oct-24     Information published. 1.1    16-Oct-24     Added samba to Azure Linux 3.0 1.2    17-Oct-24     Added samba to Azure Linux 3.0 1.3    18-Oct-24     Added samba to Azure Linux 3.0 1.4    19-Oct-24     Added samba to Azure Linux 3.0 1.5    20-Oct-24     Added samba to Azure Linux 3.0 1.6    21-Oct-24     Added samba to Azure Linux 3.0 1.7    22-Oct-24     Added samba to Azure Linux 3.0 1.8    23-Oct-24     Added samba to Azure Linux 3.0 1.9    24-Oct-24     Added samba to Azure Linux 3.0 2.0    25-Oct-24     Added samba to Azure Linux 3.0 2.1    26-Oct-24     Added samba to Azure Linux 3.0 2.2    27-Oct-24     Added samba to Azure Linux 3.0 2.3    28-Oct-24     Added samba to Azure Linux 3.0 2.4    29-Oct-24     Added samba to Azure Linux 3.0 2.5    30-Oct-24     Added samba to Azure Linux 3.0 2.6    31-Oct-24     Added samba to Azure Linux 3.0 2.7    01-Nov-24     Added samba to Azure Linux 3.0 2.8    02-Nov-24     Added samba to Azure Linux 3.0 2.9    04-Nov-24     Added samba to Azure Linux 3.0 3.0    05-Nov-24     Added samba to Azure Linux 3.0 3.1    06-Nov-24     Added samba to Azure Linux 3.0 3.2    07-Nov-24     Added samba to Azure Linux 3.0 3.3    08-Nov-24     Added samba to Azure Linux 3.0 3.4    09-Nov-24     Added samba to Azure Linux 3.0 3.5    10-Nov-24     Added samba to Azure Linux 3.0 3.6    11-Nov-24     Added samba to Azure Linux 3.0 3.7    12-Nov-24     Added samba to Azure Linux 3.0 3.8    13-Nov-24     Added samba to Azure Linux 3.0 3.9    14-Nov-24     Added samba to Azure Linux 3.0 4.0    15-Nov-24     Added samba to Azure Linux 3.0 4.1    16-Nov-24     Added samba to Azure Linux 3.0 4.2    17-Nov-24     Added samba to Azure Linux 3.0 4.3    18-Nov-24     Added samba to Azure Linux 3.0 4.4    19-Nov-24     Added samba to Azure Linux 3.0 4.5    20-Nov-24     Added samba to Azure Linux 3.0 4.6    21-Nov-24     Added samba to Azure Linux 3.0 4.7    23-Nov-24     Added samba to Azure Linux 3.0 4.8    24-Nov-24     Added samba to Azure Linux 3.0 4.9    25-Nov-24     Added samba to Azure Linux 3.0 5.0    26-Nov-24     Added samba to Azure Linux 3.0 5.1    27-Nov-24     Added samba to Azure Linux 3.0 5.2    28-Nov-24     Added samba to Azure Linux 3.0 5.3    29-Nov-24     Added samba to Azure Linux 3.0 5.4    30-Nov-24     Added samba to Azure Linux 3.0 5.5    01-Dec-24     Added samba to Azure Linux 3.0 5.6    02-Dec-24     Added samba to Azure Linux 3.0 5.7    03-Dec-24     Added samba to Azure Linux 3.0 5.8    04-Dec-24     Added samba to Azure Linux 3.0 5.9    05-Dec-24     Added samba to Azure Linux 3.0 6.0    07-Dec-24     Added samba to Azure Linux 3.0 6.1    08-Dec-24     Added samba to Azure Linux 3.0 6.2    09-Dec-24     Added samba to Azure Linux 3.0 6.3    10-Dec-24     Added samba to Azure Linux 3.0 6.4    11-Dec-24     Added samba to Azure Linux 3.0 6.5    12-Dec-24     Added samba to Azure Linux 3.0 6.6    13-Dec-24     Added samba to Azure Linux 3.0 6.7    14-Dec-24     Added samba to Azure Linux 3.0 6.8    15-Dec-24     Added samba to Azure Linux 3.0 6.9    16-Dec-24     Added samba to Azure Linux 3.0 7.0    17-Dec-24     Added samba to Azure Linux 3.0 7.1    18-Dec-24     Added samba to Azure Linux 3.0 7.2    19-Dec-24     Added samba to Azure Linux 3.0 7.3    20-Dec-24     Added samba to Azure Linux 3.0 7.4    21-Dec-24     Added samba to Azure Linux 3.0 7.5    22-Dec-24     Added samba to Azure Linux 3.0 7.6    23-Dec-24     Added samba to Azure Linux 3.0 7.7    24-Dec-24     Added samba to Azure Linux 3.0 7.8    25-Dec-24     Added samba to Azure Linux 3.0 7.9    26-Dec-24     Added samba to Azure Linux 3.0 8.0    27-Dec-24     Added samba to Azure Linux 3.0 8.1    28-Dec-24     Added samba to Azure Linux 3.0 8.2    29-Dec-24     Added samba to Azure Linux 3.0 8.3    30-Dec-24     Added samba to Azure Linux 3.0 8.4    31-Dec-24     Added samba to Azure Linux 3.0 8.5    01-Jan-25     Added samba to Azure Linux 3.0 8.6    02-Jan-25     Added samba to Azure Linux 3.0 8.7    03-Jan-25     Added samba to Azure Linux 3.0 8.8    04-Jan-25     Added samba to Azure Linux 3.0 8.9    05-Jan-25     Added samba to Azure Linux 3.0 9.0    06-Jan-25     Added samba to Azure Linux 3.0 9.1    07-Jan-25     Added samba to Azure Linux 3.0 9.2    08-Jan-25     Added samba to Azure Linux 3.0 9.3    09-Jan-25     Added samba to Azure Linux 3.0 9.4    10-Jan-25     Added samba to Azure Linux 3.0 9.5    11-Jan-25     Added samba to Azure Linux 3.0 9.6    12-Jan-25     Added samba to Azure Linux 3.0 9.7    13-Jan-25     Added samba to Azure Linux 3.0 9.8    15-Jan-25     Added samba to Azure Linux 3.0 9.9    16-Jan-25     Added samba to Azure Linux 3.0 10.0    17-Jan-25     Added samba to Azure Linux 3.0 10.1    18-Jan-25     Added samba to Azure Linux 3.0 10.2    19-Jan-25     Added samba to Azure Linux 3.0 10.3    20-Jan-25     Added samba to Azure Linux 3.0 10.4    21-Jan-25     Added samba to Azure Linux 3.0 10.5    22-Jan-25     Added samba to Azure Linux 3.0 10.6    23-Jan-25     Added samba to Azure Linux 3.0 10.7    24-Jan-25     Added samba to Azure Linux 3.0 10.8    25-Jan-25     Added samba to Azure Linux 3.0 10.9    27-Jan-25     Added samba to Azure Linux 3.0 11.0    28-Jan-25     Added samba to Azure Linux 3.0 11.1    29-Jan-25     Added samba to Azure Linux 3.0 11.2    30-Jan-25     Added samba to Azure Linux 3.0 11.3    01-Feb-25     Added samba to Azure Linux 3.0 11.4    02-Feb-25     Added samba to Azure Linux 3.0 11.5    03-Feb-25     Added samba to Azure Linux 3.0 11.6    04-Feb-25     Added samba to Azure Linux 3.0 11.7    05-Feb-25     Added samba to Azure Linux 3.0 11.8    07-Feb-25     Added samba to Azure Linux 3.0 11.9    08-Feb-25     Added samba to Azure Linux 3.0 12.0    09-Feb-25     Added samba to Azure Linux 3.0 12.1    10-Feb-25     Added samba to Azure Linux 3.0 12.2    11-Feb-25     Added samba to Azure Linux 3.0 12.3    12-Feb-25     Added samba to Azure Linux 3.0 12.4    13-Feb-25     Added samba to Azure Linux 3.0 12.5    14-Feb-25     Added samba to Azure Linux 3.0 12.6    15-Feb-25     Added samba to Azure Linux 3.0 12.7    16-Feb-25     Added samba to Azure Linux 3.0 12.8    17-Feb-25     Added samba to Azure Linux 3.0 12.9    18-Feb-25     Added samba to Azure Linux 3.0 13.0    19-Feb-25     Added samba to Azure Linux 3.0 13.1    20-Feb-25     Added samba to Azure Linux 3.0 13.2    21-Feb-25     Added samba to Azure Linux 3.0 13.3    22-Feb-25     Added samba to Azure Linux 3.0 13.4    23-Feb-25     Added samba to Azure Linux 3.0 13.5    24-Feb-25     Added samba to Azure Linux 3.0 13.6    25-Feb-25     Added samba to Azure Linux 3.0 13.7    26-Feb-25     Added samba to Azure Linux 3.0 13.8    27-Feb-25     Added samba to Azure Linux 3.0 13.9    28-Feb-25     Added samba to Azure Linux 3.0 14.0    01-Mar-25     Added samba to Azure Linux 3.0 14.1    02-Mar-25     Added samba to Azure Linux 3.0 14.2    03-Mar-25     Added samba to Azure Linux 3.0 14.3    04-Mar-25     Added samba to Azure Linux 3.0 14.4    05-Mar-25     Added samba to Azure Linux 3.0 14.5    06-Mar-25     Added samba to Azure Linux 3.0 14.6    08-Mar-25     Added samba to Azure Linux 3.0 14.7    09-Mar-25     Added samba to Azure Linux 3.0 14.8    10-Mar-25     Added samba to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-32746 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | samba (CBL-Mariner) | Unknown | Unknown | Base: 5.4 Temporal: 5.4 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
4.18.3-1 |
Unknown | None | |
Azure Linux 3.0 x64 | samba (CBL-Mariner) | Unknown | Unknown | Base: 5.4 Temporal: 5.4 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
4.18.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-32746 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-20277
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    15-Oct-24     Information published. 1.1    16-Oct-24     Added samba to Azure Linux 3.0 1.2    17-Oct-24     Added samba to Azure Linux 3.0 1.3    18-Oct-24     Added samba to Azure Linux 3.0 1.4    19-Oct-24     Added samba to Azure Linux 3.0 1.5    20-Oct-24     Added samba to Azure Linux 3.0 1.6    21-Oct-24     Added samba to Azure Linux 3.0 1.7    22-Oct-24     Added samba to Azure Linux 3.0 1.8    23-Oct-24     Added samba to Azure Linux 3.0 1.9    24-Oct-24     Added samba to Azure Linux 3.0 2.0    25-Oct-24     Added samba to Azure Linux 3.0 2.1    26-Oct-24     Added samba to Azure Linux 3.0 2.2    27-Oct-24     Added samba to Azure Linux 3.0 2.3    28-Oct-24     Added samba to Azure Linux 3.0 2.4    29-Oct-24     Added samba to Azure Linux 3.0 2.5    30-Oct-24     Added samba to Azure Linux 3.0 2.6    31-Oct-24     Added samba to Azure Linux 3.0 2.7    01-Nov-24     Added samba to Azure Linux 3.0 2.8    02-Nov-24     Added samba to Azure Linux 3.0 2.9    04-Nov-24     Added samba to Azure Linux 3.0 3.0    05-Nov-24     Added samba to Azure Linux 3.0 3.1    06-Nov-24     Added samba to Azure Linux 3.0 3.2    07-Nov-24     Added samba to Azure Linux 3.0 3.3    08-Nov-24     Added samba to Azure Linux 3.0 3.4    09-Nov-24     Added samba to Azure Linux 3.0 3.5    10-Nov-24     Added samba to Azure Linux 3.0 3.6    11-Nov-24     Added samba to Azure Linux 3.0 3.7    12-Nov-24     Added samba to Azure Linux 3.0 3.8    13-Nov-24     Added samba to Azure Linux 3.0 3.9    14-Nov-24     Added samba to Azure Linux 3.0 4.0    15-Nov-24     Added samba to Azure Linux 3.0 4.1    16-Nov-24     Added samba to Azure Linux 3.0 4.2    17-Nov-24     Added samba to Azure Linux 3.0 4.3    18-Nov-24     Added samba to Azure Linux 3.0 4.4    19-Nov-24     Added samba to Azure Linux 3.0 4.5    20-Nov-24     Added samba to Azure Linux 3.0 4.6    21-Nov-24     Added samba to Azure Linux 3.0 4.7    23-Nov-24     Added samba to Azure Linux 3.0 4.8    24-Nov-24     Added samba to Azure Linux 3.0 4.9    25-Nov-24     Added samba to Azure Linux 3.0 5.0    26-Nov-24     Added samba to Azure Linux 3.0 5.1    27-Nov-24     Added samba to Azure Linux 3.0 5.2    28-Nov-24     Added samba to Azure Linux 3.0 5.3    29-Nov-24     Added samba to Azure Linux 3.0 5.4    30-Nov-24     Added samba to Azure Linux 3.0 5.5    01-Dec-24     Added samba to Azure Linux 3.0 5.6    02-Dec-24     Added samba to Azure Linux 3.0 5.7    03-Dec-24     Added samba to Azure Linux 3.0 5.8    04-Dec-24     Added samba to Azure Linux 3.0 5.9    05-Dec-24     Added samba to Azure Linux 3.0 6.0    07-Dec-24     Added samba to Azure Linux 3.0 6.1    08-Dec-24     Added samba to Azure Linux 3.0 6.2    09-Dec-24     Added samba to Azure Linux 3.0 6.3    10-Dec-24     Added samba to Azure Linux 3.0 6.4    11-Dec-24     Added samba to Azure Linux 3.0 6.5    12-Dec-24     Added samba to Azure Linux 3.0 6.6    13-Dec-24     Added samba to Azure Linux 3.0 6.7    14-Dec-24     Added samba to Azure Linux 3.0 6.8    15-Dec-24     Added samba to Azure Linux 3.0 6.9    16-Dec-24     Added samba to Azure Linux 3.0 7.0    17-Dec-24     Added samba to Azure Linux 3.0 7.1    18-Dec-24     Added samba to Azure Linux 3.0 7.2    19-Dec-24     Added samba to Azure Linux 3.0 7.3    20-Dec-24     Added samba to Azure Linux 3.0 7.4    21-Dec-24     Added samba to Azure Linux 3.0 7.5    22-Dec-24     Added samba to Azure Linux 3.0 7.6    23-Dec-24     Added samba to Azure Linux 3.0 7.7    24-Dec-24     Added samba to Azure Linux 3.0 7.8    25-Dec-24     Added samba to Azure Linux 3.0 7.9    26-Dec-24     Added samba to Azure Linux 3.0 8.0    27-Dec-24     Added samba to Azure Linux 3.0 8.1    28-Dec-24     Added samba to Azure Linux 3.0 8.2    29-Dec-24     Added samba to Azure Linux 3.0 8.3    30-Dec-24     Added samba to Azure Linux 3.0 8.4    31-Dec-24     Added samba to Azure Linux 3.0 8.5    01-Jan-25     Added samba to Azure Linux 3.0 8.6    02-Jan-25     Added samba to Azure Linux 3.0 8.7    03-Jan-25     Added samba to Azure Linux 3.0 8.8    04-Jan-25     Added samba to Azure Linux 3.0 8.9    05-Jan-25     Added samba to Azure Linux 3.0 9.0    06-Jan-25     Added samba to Azure Linux 3.0 9.1    07-Jan-25     Added samba to Azure Linux 3.0 9.2    08-Jan-25     Added samba to Azure Linux 3.0 9.3    09-Jan-25     Added samba to Azure Linux 3.0 9.4    10-Jan-25     Added samba to Azure Linux 3.0 9.5    11-Jan-25     Added samba to Azure Linux 3.0 9.6    12-Jan-25     Added samba to Azure Linux 3.0 9.7    13-Jan-25     Added samba to Azure Linux 3.0 9.8    15-Jan-25     Added samba to Azure Linux 3.0 9.9    16-Jan-25     Added samba to Azure Linux 3.0 10.0    17-Jan-25     Added samba to Azure Linux 3.0 10.1    18-Jan-25     Added samba to Azure Linux 3.0 10.2    19-Jan-25     Added samba to Azure Linux 3.0 10.3    20-Jan-25     Added samba to Azure Linux 3.0 10.4    21-Jan-25     Added samba to Azure Linux 3.0 10.5    22-Jan-25     Added samba to Azure Linux 3.0 10.6    23-Jan-25     Added samba to Azure Linux 3.0 10.7    24-Jan-25     Added samba to Azure Linux 3.0 10.8    25-Jan-25     Added samba to Azure Linux 3.0 10.9    27-Jan-25     Added samba to Azure Linux 3.0 11.0    28-Jan-25     Added samba to Azure Linux 3.0 11.1    29-Jan-25     Added samba to Azure Linux 3.0 11.2    30-Jan-25     Added samba to Azure Linux 3.0 11.3    01-Feb-25     Added samba to Azure Linux 3.0 11.4    02-Feb-25     Added samba to Azure Linux 3.0 11.5    03-Feb-25     Added samba to Azure Linux 3.0 11.6    04-Feb-25     Added samba to Azure Linux 3.0 11.7    05-Feb-25     Added samba to Azure Linux 3.0 11.8    07-Feb-25     Added samba to Azure Linux 3.0 11.9    08-Feb-25     Added samba to Azure Linux 3.0 12.0    09-Feb-25     Added samba to Azure Linux 3.0 12.1    10-Feb-25     Added samba to Azure Linux 3.0 12.2    11-Feb-25     Added samba to Azure Linux 3.0 12.3    12-Feb-25     Added samba to Azure Linux 3.0 12.4    13-Feb-25     Added samba to Azure Linux 3.0 12.5    14-Feb-25     Added samba to Azure Linux 3.0 12.6    15-Feb-25     Added samba to Azure Linux 3.0 12.7    16-Feb-25     Added samba to Azure Linux 3.0 12.8    17-Feb-25     Added samba to Azure Linux 3.0 12.9    18-Feb-25     Added samba to Azure Linux 3.0 13.0    19-Feb-25     Added samba to Azure Linux 3.0 13.1    20-Feb-25     Added samba to Azure Linux 3.0 13.2    21-Feb-25     Added samba to Azure Linux 3.0 13.3    22-Feb-25     Added samba to Azure Linux 3.0 13.4    23-Feb-25     Added samba to Azure Linux 3.0 13.5    24-Feb-25     Added samba to Azure Linux 3.0 13.6    25-Feb-25     Added samba to Azure Linux 3.0 13.7    26-Feb-25     Added samba to Azure Linux 3.0 13.8    27-Feb-25     Added samba to Azure Linux 3.0 13.9    28-Feb-25     Added samba to Azure Linux 3.0 14.0    01-Mar-25     Added samba to Azure Linux 3.0 14.1    02-Mar-25     Added samba to Azure Linux 3.0 14.2    03-Mar-25     Added samba to Azure Linux 3.0 14.3    04-Mar-25     Added samba to Azure Linux 3.0 14.4    05-Mar-25     Added samba to Azure Linux 3.0 14.5    06-Mar-25     Added samba to Azure Linux 3.0 14.6    08-Mar-25     Added samba to Azure Linux 3.0 14.7    09-Mar-25     Added samba to Azure Linux 3.0 14.8    10-Mar-25     Added samba to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-20277 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | samba (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
4.18.3-1 |
Unknown | None | |
Azure Linux 3.0 x64 | samba (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
4.18.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-20277 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-3816
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Apr-24     Information published. 1.6    30-Jun-24     Information published. 1.1    02-Jul-24     Information published. 1.2    03-Jul-24     Information published. 1.3    04-Jul-24     Information published. 1.4    05-Jul-24     Information published. 1.5    06-Jul-24     Information published. 1.7    08-Jul-24     Information published. 1.8    09-Jul-24     Information published. 1.9    10-Jul-24     Information published. 2.0    12-Jul-24     Information published. 2.1    13-Jul-24     Information published. 2.2    14-Jul-24     Information published. 2.3    15-Jul-24     Information published. 2.4    16-Jul-24     Information published. 2.5    17-Jul-24     Information published. 2.6    19-Jul-24     Information published. 2.7    20-Jul-24     Information published. 2.8    21-Jul-24     Information published. 2.9    22-Jul-24     Information published. 3.0    23-Jul-24     Information published. 3.1    24-Jul-24     Information published. 3.2    25-Jul-24     Information published. 3.3    26-Jul-24     Information published. 3.4    27-Jul-24     Information published. 3.5    28-Jul-24     Information published. 3.6    29-Jul-24     Information published. 3.7    02-Aug-24     Information published. 3.8    03-Aug-24     Information published. 3.9    04-Aug-24     Information published. 4.0    05-Aug-24     Information published. 4.1    06-Aug-24     Information published. 4.2    07-Aug-24     Information published. 4.3    08-Aug-24     Information published. 4.4    09-Aug-24     Information published. 4.5    10-Aug-24     Information published. 4.6    11-Aug-24     Information published. 4.7    12-Aug-24     Information published. 4.8    16-Aug-24     Information published. 4.9    17-Aug-24     Information published. 5.0    18-Aug-24     Information published. 5.1    19-Aug-24     Information published. 5.2    20-Aug-24     Information published. 5.3    21-Aug-24     Information published. 5.4    22-Aug-24     Information published. 5.5    23-Aug-24     Information published. 5.6    24-Aug-24     Information published. 5.7    25-Aug-24     Information published. 5.8    26-Aug-24     Information published. 5.9    27-Aug-24     Information published. 6.0    28-Aug-24     Information published. 6.1    29-Aug-24     Information published. 6.2    30-Aug-24     Information published. 6.3    31-Aug-24     Information published. 6.4    01-Sep-24     Information published. 6.5    02-Sep-24     Information published. 6.6    03-Sep-24     Information published. 6.7    05-Sep-24     Information published. 6.8    06-Sep-24     Information published. 6.9    07-Sep-24     Information published. 7.0    08-Sep-24     Information published. 7.1    11-Sep-24     Information published. 7.2    12-Sep-24     Information published. 7.3    13-Sep-24     Information published. 7.4    14-Sep-24     Information published. 7.5    15-Sep-24     Information published. 7.6    16-Sep-24     Information published. 7.7    17-Sep-24     Information published. 7.8    18-Sep-24     Information published. 7.9    19-Sep-24     Information published. 8.0    20-Sep-24     Information published. 8.1    21-Sep-24     Information published. 8.2    22-Sep-24     Information published. 8.3    23-Sep-24     Information published. 8.4    24-Sep-24     Information published. 8.5    25-Sep-24     Information published. 8.6    26-Sep-24     Information published. 8.7    27-Sep-24     Information published. 8.8    28-Sep-24     Information published. 8.9    29-Sep-24     Information published. 9.0    30-Sep-24     Information published. 9.1    01-Oct-24     Information published. 9.2    02-Oct-24     Information published. 9.3    03-Oct-24     Information published. 9.4    04-Oct-24     Information published. 9.5    05-Oct-24     Information published. 9.6    06-Oct-24     Information published. 9.7    07-Oct-24     Information published. 9.8    08-Oct-24     Information published. 9.9    09-Oct-24     Information published. 10.0    10-Oct-24     Information published. 10.1    11-Oct-24     Information published. 10.2    12-Oct-24     Information published. 10.3    13-Oct-24     Information published. 10.4    14-Oct-24     Information published. 10.5    15-Oct-24     Added openwsman to CBL-Mariner 2.0 10.6    16-Oct-24     Added openwsman to CBL-Mariner 2.0 10.7    17-Oct-24     Added openwsman to CBL-Mariner 2.0 10.8    18-Oct-24     Added openwsman to CBL-Mariner 2.0 10.9    19-Oct-24     Added openwsman to CBL-Mariner 2.0 11.0    20-Oct-24     Added openwsman to CBL-Mariner 2.0 11.1    21-Oct-24     Added openwsman to CBL-Mariner 2.0 11.2    22-Oct-24     Added openwsman to CBL-Mariner 2.0 11.3    23-Oct-24     Added openwsman to CBL-Mariner 2.0 11.4    24-Oct-24     Added openwsman to CBL-Mariner 2.0 11.5    25-Oct-24     Added openwsman to CBL-Mariner 2.0 11.6    26-Oct-24     Added openwsman to CBL-Mariner 2.0 11.7    27-Oct-24     Added openwsman to CBL-Mariner 2.0 11.8    28-Oct-24     Added openwsman to CBL-Mariner 2.0 11.9    29-Oct-24     Added openwsman to CBL-Mariner 2.0 12.0    30-Oct-24     Added openwsman to CBL-Mariner 2.0 12.1    31-Oct-24     Added openwsman to CBL-Mariner 2.0 12.2    01-Nov-24     Added openwsman to CBL-Mariner 2.0 12.3    02-Nov-24     Added openwsman to CBL-Mariner 2.0 12.4    04-Nov-24     Added openwsman to CBL-Mariner 2.0 12.5    05-Nov-24     Added openwsman to CBL-Mariner 2.0 12.6    06-Nov-24     Added openwsman to CBL-Mariner 2.0 12.7    07-Nov-24     Added openwsman to CBL-Mariner 2.0 12.8    08-Nov-24     Added openwsman to CBL-Mariner 2.0 12.9    09-Nov-24     Added openwsman to CBL-Mariner 2.0 13.0    10-Nov-24     Added openwsman to CBL-Mariner 2.0 13.1    11-Nov-24     Added openwsman to CBL-Mariner 2.0 13.2    12-Nov-24     Added openwsman to CBL-Mariner 2.0 13.3    13-Nov-24     Added openwsman to CBL-Mariner 2.0 13.4    14-Nov-24     Added openwsman to CBL-Mariner 2.0 13.5    15-Nov-24     Added openwsman to CBL-Mariner 2.0 13.6    16-Nov-24     Added openwsman to CBL-Mariner 2.0 13.7    17-Nov-24     Added openwsman to CBL-Mariner 2.0 13.8    18-Nov-24     Added openwsman to CBL-Mariner 2.0 13.9    19-Nov-24     Added openwsman to CBL-Mariner 2.0 14.0    20-Nov-24     Added openwsman to CBL-Mariner 2.0 14.1    21-Nov-24     Added openwsman to CBL-Mariner 2.0 14.2    23-Nov-24     Added openwsman to CBL-Mariner 2.0 14.3    24-Nov-24     Added openwsman to CBL-Mariner 2.0 14.4    25-Nov-24     Added openwsman to CBL-Mariner 2.0 14.5    26-Nov-24     Added openwsman to CBL-Mariner 2.0 14.6    27-Nov-24     Added openwsman to CBL-Mariner 2.0 14.7    28-Nov-24     Added openwsman to CBL-Mariner 2.0 14.8    29-Nov-24     Added openwsman to CBL-Mariner 2.0 14.9    30-Nov-24     Added openwsman to CBL-Mariner 2.0 15.0    01-Dec-24     Added openwsman to CBL-Mariner 2.0 15.1    02-Dec-24     Added openwsman to CBL-Mariner 2.0 15.2    03-Dec-24     Added openwsman to CBL-Mariner 2.0 15.3    04-Dec-24     Added openwsman to CBL-Mariner 2.0 15.4    05-Dec-24     Added openwsman to CBL-Mariner 2.0 15.5    07-Dec-24     Added openwsman to CBL-Mariner 2.0 15.6    08-Dec-24     Added openwsman to CBL-Mariner 2.0 15.7    09-Dec-24     Added openwsman to CBL-Mariner 2.0 15.8    10-Dec-24     Added openwsman to CBL-Mariner 2.0 15.9    11-Dec-24     Added openwsman to CBL-Mariner 2.0 16.0    12-Dec-24     Added openwsman to CBL-Mariner 2.0 16.1    13-Dec-24     Added openwsman to CBL-Mariner 2.0 16.2    14-Dec-24     Added openwsman to CBL-Mariner 2.0 16.3    15-Dec-24     Added openwsman to CBL-Mariner 2.0 16.4    16-Dec-24     Added openwsman to CBL-Mariner 2.0 16.5    17-Dec-24     Added openwsman to CBL-Mariner 2.0 16.6    18-Dec-24     Added openwsman to CBL-Mariner 2.0 16.7    19-Dec-24     Added openwsman to CBL-Mariner 2.0 16.8    20-Dec-24     Added openwsman to CBL-Mariner 2.0 16.9    21-Dec-24     Added openwsman to CBL-Mariner 2.0 17.0    22-Dec-24     Added openwsman to CBL-Mariner 2.0 17.1    23-Dec-24     Added openwsman to CBL-Mariner 2.0 17.2    24-Dec-24     Added openwsman to CBL-Mariner 2.0 17.3    25-Dec-24     Added openwsman to CBL-Mariner 2.0 17.4    26-Dec-24     Added openwsman to CBL-Mariner 2.0 17.5    27-Dec-24     Added openwsman to CBL-Mariner 2.0 17.6    28-Dec-24     Added openwsman to CBL-Mariner 2.0 17.7    29-Dec-24     Added openwsman to CBL-Mariner 2.0 17.8    30-Dec-24     Added openwsman to CBL-Mariner 2.0 17.9    31-Dec-24     Added openwsman to CBL-Mariner 2.0 18.0    01-Jan-25     Added openwsman to CBL-Mariner 2.0 18.1    02-Jan-25     Added openwsman to CBL-Mariner 2.0 18.2    03-Jan-25     Added openwsman to CBL-Mariner 2.0 18.3    04-Jan-25     Added openwsman to CBL-Mariner 2.0 18.4    05-Jan-25     Added openwsman to CBL-Mariner 2.0 18.5    06-Jan-25     Added openwsman to CBL-Mariner 2.0 18.6    07-Jan-25     Added openwsman to CBL-Mariner 2.0 18.7    08-Jan-25     Added openwsman to CBL-Mariner 2.0 18.8    09-Jan-25     Added openwsman to CBL-Mariner 2.0 18.9    10-Jan-25     Added openwsman to CBL-Mariner 2.0 19.0    11-Jan-25     Added openwsman to CBL-Mariner 2.0 19.1    12-Jan-25     Added openwsman to CBL-Mariner 2.0 19.2    13-Jan-25     Added openwsman to CBL-Mariner 2.0 19.3    15-Jan-25     Added openwsman to CBL-Mariner 2.0 19.4    16-Jan-25     Added openwsman to CBL-Mariner 2.0 19.5    17-Jan-25     Added openwsman to CBL-Mariner 2.0 19.6    18-Jan-25     Added openwsman to CBL-Mariner 2.0 19.7    19-Jan-25     Added openwsman to CBL-Mariner 2.0 19.8    20-Jan-25     Added openwsman to CBL-Mariner 2.0 19.9    21-Jan-25     Added openwsman to CBL-Mariner 2.0 20.0    22-Jan-25     Added openwsman to CBL-Mariner 2.0 20.1    23-Jan-25     Added openwsman to CBL-Mariner 2.0 20.2    24-Jan-25     Added openwsman to CBL-Mariner 2.0 20.3    25-Jan-25     Added openwsman to CBL-Mariner 2.0 20.4    27-Jan-25     Added openwsman to CBL-Mariner 2.0 20.5    28-Jan-25     Added openwsman to CBL-Mariner 2.0 20.6    29-Jan-25     Added openwsman to CBL-Mariner 2.0 20.7    30-Jan-25     Added openwsman to CBL-Mariner 2.0 20.8    01-Feb-25     Added openwsman to CBL-Mariner 2.0 20.9    02-Feb-25     Added openwsman to CBL-Mariner 2.0 21.0    03-Feb-25     Added openwsman to CBL-Mariner 2.0 21.1    04-Feb-25     Added openwsman to CBL-Mariner 2.0 21.2    05-Feb-25     Added openwsman to CBL-Mariner 2.0 21.3    07-Feb-25     Added openwsman to CBL-Mariner 2.0 21.4    08-Feb-25     Added openwsman to CBL-Mariner 2.0 21.5    09-Feb-25     Added openwsman to CBL-Mariner 2.0 21.6    10-Feb-25     Added openwsman to CBL-Mariner 2.0 21.7    11-Feb-25     Added openwsman to CBL-Mariner 2.0 21.8    12-Feb-25     Added openwsman to CBL-Mariner 2.0 21.9    13-Feb-25     Added openwsman to CBL-Mariner 2.0 22.0    14-Feb-25     Added openwsman to CBL-Mariner 2.0 22.1    15-Feb-25     Added openwsman to CBL-Mariner 2.0 22.2    16-Feb-25     Added openwsman to CBL-Mariner 2.0 22.3    17-Feb-25     Added openwsman to CBL-Mariner 2.0 22.4    18-Feb-25     Added openwsman to CBL-Mariner 2.0 22.5    19-Feb-25     Added openwsman to CBL-Mariner 2.0 22.6    20-Feb-25     Added openwsman to CBL-Mariner 2.0 22.7    21-Feb-25     Added openwsman to CBL-Mariner 2.0 22.8    22-Feb-25     Added openwsman to CBL-Mariner 2.0 22.9    23-Feb-25     Added openwsman to CBL-Mariner 2.0 23.0    24-Feb-25     Added openwsman to CBL-Mariner 2.0 23.1    25-Feb-25     Added openwsman to CBL-Mariner 2.0 23.2    26-Feb-25     Added openwsman to CBL-Mariner 2.0 23.3    27-Feb-25     Added openwsman to CBL-Mariner 2.0 23.4    28-Feb-25     Added openwsman to CBL-Mariner 2.0 23.5    01-Mar-25     Added openwsman to CBL-Mariner 2.0 23.6    02-Mar-25     Added openwsman to CBL-Mariner 2.0 23.7    03-Mar-25     Added openwsman to CBL-Mariner 2.0 23.8    04-Mar-25     Added openwsman to CBL-Mariner 2.0 23.9    05-Mar-25     Added openwsman to CBL-Mariner 2.0 24.0    06-Mar-25     Added openwsman to CBL-Mariner 2.0 24.1    08-Mar-25     Added openwsman to CBL-Mariner 2.0 24.2    09-Mar-25     Added openwsman to CBL-Mariner 2.0 24.3    10-Mar-25     Added openwsman to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-3816 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | openwsman (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.6.8-13 |
Unknown | None | |
CBL Mariner 2.0 x64 | openwsman (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.6.8-13 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-3816 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-26466
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    02-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-26466 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | openssh (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
9.8p1-3 |
Unknown | None | |
Azure Linux 3.0 x64 | openssh (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
9.8p1-3 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-26466 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-50608
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    04-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-50608 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | fluent-bit (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.0.6-2 |
Unknown | None | |
CBL Mariner 2.0 x64 | fluent-bit (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.0.6-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-50608 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-26618
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    04-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-26618 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | erlang (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
25.2-3 |
Unknown | None | |
CBL Mariner 2.0 x64 | erlang (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
25.2-3 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-26618 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-1454
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.4/TemporalScore:3.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    30-Jun-24     Information published. 1.1    04-Mar-25     Added opensc to CBL-Mariner 2.0 Added opensc to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-1454 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | opensc (CBL-Mariner) | Unknown | Unknown | Base: 3.4 Temporal: 3.4 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |
0.25.1-3 |
Unknown | None | |
Azure Linux 3.0 x64 | opensc (CBL-Mariner) | Unknown | Unknown | Base: 3.4 Temporal: 3.4 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |
0.25.1-3 |
Unknown | None | |
CBL Mariner 2.0 ARM | opensc (CBL-Mariner) | Unknown | Unknown | Base: 3.4 Temporal: 3.4 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |
0.23.0-4 |
Unknown | None | |
CBL Mariner 2.0 x64 | opensc (CBL-Mariner) | Unknown | Unknown | Base: 3.4 Temporal: 3.4 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |
0.23.0-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-1454 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-9681
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    30-Jan-25     Information published. 0.3    01-Feb-25     Information published. 0.4    13-Feb-25     Information published. 0.5    23-Feb-25     Information published. 0.6    04-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-9681 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | cmake (CBL-Mariner) curl (CBL-Mariner) mysql (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L |
3.30.3-4 8.8.0-4 8.0.40-5 |
None | ||
Azure Linux 3.0 x64 | cmake (CBL-Mariner) curl (CBL-Mariner) mysql (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L |
3.30.3-4 8.8.0-4 8.0.40-5 |
None | ||
CBL Mariner 2.0 ARM | cmake (CBL-Mariner) curl (CBL-Mariner) mysql (CBL-Mariner) rust (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L |
3.21.4-16 8.8.0-5 8.0.40-3 1.72.0-10 |
None | ||
CBL Mariner 2.0 x64 | cmake (CBL-Mariner) curl (CBL-Mariner) mysql (CBL-Mariner) rust (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L |
3.21.4-16 8.8.0-5 8.0.40-3 1.72.0-10 |
None |
CVE ID | Acknowledgements |
CVE-2024-9681 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-27144
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    04-Mar-25     Information published. 0.2    05-Mar-25     Information published. 0.3    06-Mar-25     Information published. 0.4    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-27144 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | cert-manager (CBL-Mariner) influxdb (CBL-Mariner) keda (CBL-Mariner) kube-vip-cloud-provider (CBL-Mariner) |
Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
1.11.2-20 2.6.1-21 2.4.0-27 0.0.2-20 |
None | ||
CBL Mariner 2.0 x64 | cert-manager (CBL-Mariner) influxdb (CBL-Mariner) keda (CBL-Mariner) kube-vip-cloud-provider (CBL-Mariner) |
Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
1.11.2-20 2.6.1-21 2.4.0-27 0.0.2-20 |
None |
CVE ID | Acknowledgements |
CVE-2025-27144 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-50609
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    04-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-50609 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | fluent-bit (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.0.6-2 |
Unknown | None | |
CBL Mariner 2.0 x64 | fluent-bit (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.0.6-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-50609 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-52917
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Nov-24     Information published. 1.1    12-Dec-24     Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0 1.2    04-Mar-25     Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-52917 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.56.1-5 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.56.1-5 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.15.173.1-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.15.173.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-52917 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-36373
MITRE NVD Issuing CNA: security@apache.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    17-Jul-21     Information published. 1.1    30-Jun-24     Information published. 1.2    04-Mar-25     Added javapackages-bootstrap to CBL-Mariner 2.0 Added javapackages-bootstrap to Azure Linux 3.0 Added ant to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-36373 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.14.0-2 |
Unknown | None | |
Azure Linux 3.0 x64 | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.14.0-2 |
Unknown | None | |
CBL Mariner 1.0 ARM | ant (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.10.11-1 |
Unknown | None | |
CBL Mariner 1.0 x64 | ant (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.10.11-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.5.0-6 |
Unknown | None | |
CBL Mariner 2.0 x64 | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.5.0-6 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-36373 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-36374
MITRE NVD Issuing CNA: security@apache.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    17-Jul-21     Information published. 1.1    30-Jun-24     Information published. 1.2    04-Mar-25     Added javapackages-bootstrap to CBL-Mariner 2.0 Added javapackages-bootstrap to Azure Linux 3.0 Added ant to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-36374 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.14.0-2 |
Unknown | None | |
Azure Linux 3.0 x64 | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.14.0-2 |
Unknown | None | |
CBL Mariner 1.0 ARM | ant (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.10.11-1 |
Unknown | None | |
CBL Mariner 1.0 x64 | ant (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.10.11-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.5.0-6 |
Unknown | None | |
CBL Mariner 2.0 x64 | javapackages-bootstrap (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.5.0-6 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-36374 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-40660
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.6/TemporalScore:6.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    30-Jun-24     Information published. 1.1    04-Mar-25     Added opensc to CBL-Mariner 2.0 Added opensc to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-40660 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | opensc (CBL-Mariner) | Unknown | Unknown | Base: 6.6 Temporal: 6.6 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
0.25.1-3 |
Unknown | None | |
Azure Linux 3.0 x64 | opensc (CBL-Mariner) | Unknown | Unknown | Base: 6.6 Temporal: 6.6 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
0.25.1-3 |
Unknown | None | |
CBL Mariner 2.0 ARM | opensc (CBL-Mariner) | Unknown | Unknown | Base: 6.6 Temporal: 6.6 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
0.23.0-4 |
Unknown | None | |
CBL Mariner 2.0 x64 | opensc (CBL-Mariner) | Unknown | Unknown | Base: 6.6 Temporal: 6.6 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
0.23.0-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-40660 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-50181
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Dec-24     Information published. 1.1    04-Mar-25     Added kernel to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-50181 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.15.173.1-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.15.173.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-50181 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-56741
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    04-Mar-25     Information published. 0.3    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56741 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56741 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39908
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    15-Oct-24     Information published. 1.1    19-Dec-24     Added ruby to Azure Linux 3.0 Added rubygem-rexml to Azure Linux 3.0 1.2    04-Mar-25     Added rubygem-rexml to CBL-Mariner 2.0 Added ruby to Azure Linux 3.0 Added rubygem-rexml to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39908 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | ruby (CBL-Mariner) rubygem-rexml (CBL-Mariner) |
Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
3.3.5-1 3.3.4-1 |
None | ||
Azure Linux 3.0 x64 | ruby (CBL-Mariner) rubygem-rexml (CBL-Mariner) |
Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
3.3.5-1 3.3.4-1 |
None | ||
CBL Mariner 2.0 ARM | rubygem-rexml (CBL-Mariner) | Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
3.2.7-4 |
Unknown | None | |
CBL Mariner 2.0 x64 | rubygem-rexml (CBL-Mariner) | Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
3.2.7-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39908 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-0840
MITRE NVD Issuing CNA: cna@vuldb.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    16-Feb-25     Information published. 0.2    05-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-0840 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | binutils (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.37-11 |
Unknown | None | |
CBL Mariner 2.0 x64 | binutils (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.37-11 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-0840 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-26973
MITRE NVD Issuing CNA: cve@kernel.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-May-24     Information published. 1.1    29-Aug-24     Information published. 1.2    30-Aug-24     Information published. 1.3    31-Aug-24     Information published. 1.4    01-Sep-24     Information published. 1.5    02-Sep-24     Information published. 1.6    03-Sep-24     Information published. 1.7    05-Sep-24     Information published. 1.8    06-Sep-24     Information published. 1.9    07-Sep-24     Information published. 2.0    08-Sep-24     Information published. 2.1    11-Sep-24     Information published. 2.2    05-Mar-25     Added hyperv-daemons to CBL-Mariner 2.0 Added hyperv-daemons to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-26973 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | hyperv-daemons (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.35.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | hyperv-daemons (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.35.1-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | hyperv-daemons (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.158.1-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | hyperv-daemons (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.158.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-26973 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-53150
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-53150 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-53150 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-53151
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-53151 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-53151 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-53215
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-53215 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-53215 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-53180
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-53180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-53180 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56568
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56568 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56568 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56567
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56567 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56567 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56598
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56598 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56598 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56634
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56634 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56634 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56640
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56640 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56640 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56720
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56720 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56720 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-56754
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    29-Jan-25     Information published. 0.2    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-56754 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.6.64.2-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-56754 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-57802
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-57802 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-57802 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-57807
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 0.1    08-Mar-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-57807 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.176.3-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-57807 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||
CVE-2024-57900
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: |